What would raise an alarm in this email address from “Microsoft”?
msonlineservices@microsfrtfonline.com
MISPELLINGS
These hackers wear white hats -- not for fashion -- but because they try to protect systems, not break them.
ETHICAL HACKERS
This common vulnerability results from not validating user input, allowing attackers to run arbitrary SQL commands on a database
SQL
*WILDCARD*
What is the command to list out all of the files in a directory?
LS
Design algorithms and ciphers to make networks more secure
CRYPTOGRAPHER
*WILDCARD*
What is the common tactic used in phishing which manipulates victims into acting quickly without fully considering the legitimacy of the request?
SENSE OF URGENCY
Who was the hacker who discovered the WannaCry kill switch, stopping one of the world’s worst cyberattacks at the time?
MARCUS HUTCHINS
*WILDCARD*
Regularly updating your software helps protect against these, which are flaws or weaknesses that hackers can exploit.
VULNERABILITY
Name a common text-editor found on Kali systems.
Options: vi, vim, nano, kate, GNOME text editor, gedit
Manage, maintain, and secure database systems.
DATABASE ADMINISTRATOR
You get a text from your ‘bank’ asking to click a link to verify your account. What is this mobile phishing technique called?
SMS PHISHING or SMISHING
This ‘hacktivist’ group is known for wearing Guy Fawkes masks and saying ‘We are Legion’
ANONYMOUS
This automatic feature in many operating systems helps keep your device secure by installing the latest security patches without needing user action.
AUTOMATIC UPDATES
What command is user to remove all the files in a directory and all its subdirectories?
RM -R
*DOUBLE JEOPARDY*
Professionals who stimulate cyber attacks to find vulnerabilities and weaknesses.
PENTESTER
A fake website that looks identical to your email login page is called this.
SPOOFED SITE
*DOUBLE JEOPARDY*
This 2014 hack leaked emails, movies, and personal data from a major movie film studio, allegedly in retaliation for a movie mocking North Korea
SONY PICTURES HACK
This type of vulnerability is caused when a program tries to store more data in a buffer than it can hold, often leading to crashes or exploitable code execution.
BUFFER OVERFLOW
What command would you use to output the sorted version of a file?
SORT
Actively search for lateral threats within the network or advanced threats like APTs.
THREAT HUNTERS
*WILDCARD*
The FBI calls this “Business Email Compromise’ -- what do we call it when scammers pretend to be the CEO and trick employees in wiring money?
hint: also is a homonym with a type of whale hunting technique
SPEAR PHISHING
This sophisticated cyberattack targeted Iranian nuclear facilities using a weaponized computer worm.
STUXNET
This Microsoft vulnerability, famously exploited by the WannaCry ransomware in 2017, was patched in MS17-010 and targeted the SMB protocol.
EXTERNAL BLUE
*DOUBLE JEOPARDY*
How do you create a symbolic link between files?
LN -S
Maintain the integrity of Layer 2 and Layer 3 operations.
NETWORK ADMINISTRATORS