The Watcher
Loggin'
hackers
cyber misc.
100

A tool that continually monitors network traffic 

What is a Network Monitor

100

Contains recorded conditions recognized by operating system

What is a Log

100

She is the technical analyst of the Behavioral Analysis Unit on the show criminal minds. 

what is Penelope Garcia 

100

A program that is designed only to read Hyper Text Markup Language web pages downloaded from Internet websites.

What is a browser or web browser?

200

traffic sent to any port on a switch can be sent to a mirrored port.

What is port mirroring?

200

Application to view log information in Windows

What is an Event Viewer Application

200

He plans and finds people to do heists and keeps it well hidden.

Who is Lester Crest?

200

Refers to a system that functions reliably nearly all the time

What is high availability

300

running monitoring software on a computer connected wirelessly to the network, is what type of monitoring? 

wireless 

300

The most secure version of the SNMP protocol

What is SNMPv3

300

The cyber intelligence specialist in the live action film G-Force who is the hidden main antagonist

Who is Speckles the mole?

300

when someone makes a fake website and fake email address to try and steal people's personal information. 

what is phishing? 
400

a tool that can monitor traffic at a specific interface between a server or client and the network. 

protocol analyzer

400

standard for generating, storing, and processing messages about events on Linux or UNIX 

what is the Syslog function?

400

He made a peer-to-peer file-sharing service that allowed people to download songs that were previously recorded. 

The Napster.

400

People who try to gain access to computers remotely to learn more information.

Who is a hacker?

500

The installation of a device, called a network TAP (test access point) or packet sniffer, in line with network traffic, is what type of monitoring. 

in-line monitoring 

500

This utility is responsible for generating, storing and processing events on a system.

What is a system log?

500

The technology specialist and former computer intelligence consultant who leaked highly classified information from the National Security Agency

Who is Edward Snowden

500

There are 3 elements of cybersecurity confidentiality, availability, and...

What is integrity?

M
e
n
u