What is the acronym "WAP"
Wireless Access Point
What is the acronym "HTTP"
Hyper Text Transfer Protocol
What is the acronym "IOC"
Indicator of Compromise
This is the term to describe social engineering online
Phishing
404
Not Found
What is the acronym "PSK"
Pre-Shared Key
Transmission Control Protocol
This malware disguised as a virus is named after the huge hollow horse used by the greeks to infiltrate Troy
Trojan Horse/RAT
Social engineering a HIGH value or person of interest online
Whaling
200
Ok
What is the acronym "WPA"
WiFi Protected Access
What is the acronym "UDP"
User Datagram Protocol
This is central hub for an attacker, often used to control botnets
C2/C&C
A common attack scheme where the attacker places themselves between a client and the intended target
Man In The Middle
500
Internal Server Error
This WiFi frequency is known for longer ranges in exchange for lower data rates
2.4GHz
This is the 4th layer of the OSI model
This is a term used to describe threat groups of particular stature or power in cyber terrorism
Advanced Persistent Threat
A type of encoding often used for HTML and CSS and produces an ASCII string format by translating the data into a radix-64 representation
Base64
301
Moved Permanently
This is the process that happens when a client authenticates with a access point
4 Way Handshake
This is a program that allows you to modify your HTTP requests via capturing the request using a proxy, in which you can use many modules to modify packets
Burpsuite
This is a center for sharing online threat knowledge and tactics
Information Sharing and Analysis Center
Name at least three different types of SHA hashing algorithm
Accepted Answers: SHA0, SHA1, SHA224, SHA256, SHA384, SHA512,
403
Forbidden