AI Security
Threat Landscape
Cloud Security
PANW Product
Network Security
100

The phenomenon during which a model outputs information that is incorrect but sounds real.

What is hallucination? 
100
When an attacker does a phishing type of attack, but uses voice? 

What is vishing? 

100

The security model that requires continuous verification of every user and device, assuming no one is trusted by default, regardless of location.

What is Zero Trust? 

100

This is the proprietary operating system that runs on Palo Alto Networks firewalls and provides the foundation for our security platform.

What is PanOS?

100

This network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules.

What is a firewall? 

200
This standardized communication protocol bridges the gap between AI models and external resources, enabling dynamic context retrieval and tool calling.



What is Model Context Protocol? 

200

This type of attack locks your files and demands money to unlock them. 

What is ransomware?

200

A cloud bucket with no authentication or firewall rules in is considered this.

What is publicly exposed?  

200

What cloud delivered services form PANW protects remote users and branch officers with secure access to apps. 

What is Prisma Access? 

200

This process converts readable data into an unreadable format to protect it from unauthorized access during transmission.

What is encryption? 

300

Describes AI-generated fake videos that can make anyone appear to say or do things they never actually did.

What is a Deepfake? 

300
This hacking group, linked to China, has been known to compromise routers and VPNs to maintain persistent access to networks. 

Who is Volt Typhoon? 

300

The practice of embedding security checks early into the application development process, often catching misconfigurations before deployment.

What is "Shift Left"?

300

The expanded form of "AIRS" in Prisma AIRS. 

What is AI Runtime Security?

300

This security method requires users to provide two different authentication factors, such as a password and a text message code.

What is 2FA? 

400
Users trying to trick ChatGPT or other AI chatbots into ignoring their safety rules by pretending to be in a movie or using special phrases like "ignore previous instructions."

What is jailbreaking? 

400

Attackers often steal or misuse these small text based credentials to access cloud services. 

What are API keys. 

400

A service or feature that monitors and blocks the unauthorized transfer of sensitive information outside of a defined network perimeter.

What is Data Loss Prevention (DLP)?

400

This extended detection and response platform uses AI and machine learning to detect, investigate, and respond to threats across endpoints, networks, and clouds.


What is XDR?

400

This technology creates a secure, encrypted connection over a less secure network.

What is VPN?

500

He is widely regarded as the father of the term “prompt injection”. 

Hint: also co-creator for the Django Framework. 

Who is Simon Willison?

500

A widely used 2025 malicious package type used to spread malware.

What is the npm package or PyPl? 

500

The process of dividing a cloud network into smaller, isolated segments to limit the blast radius of a potential breach.

What is network segmentation (or microsegmentation)?

500

This cloud-based malware analysis service automatically identifies unknown threats by executing suspicious files in a controlled environment.


What is Wildfire?

500

The full acronym represents the secure version of this encrypted web communication protocol.

What is HyperText Transfer Protocol Secure?

M
e
n
u