What does GDPR stand for?
What is General Data Protection Regulation
HTTP is managed at this Layer of the OSI Model
What is Application- L7
In "V for Vendetta" this character literally became the face of the hacking group Anonymous
What is V or Guy Fawkes
Which record will reveal information about a mail server for a domain?
What is a MX record
This tactic uses a false promise to pique a victim’s greed or curiosity.
What is a Baiting attack
What does CCPA stand for?
What is the California Consumer Privacy Act
TCP and UDP use this Layer of the OSI Model
What is Transport - L4
In the "Matrix" what is Neo's real name?
What is Thomas Anderson
SNMP is used to do what?
What is monitor network devices
This is the most popular social engineering attack today
What is Phishing
What dies POPIA stand for?
Protection of Personal Information Act
IPs are assigned in this Layer of the OSI Model
What is Network - L3
What are the group of Hacktivists called in "Mr. Robot"?
What is "fsociety"
What should a VPN over wireless use for tunneling?
What is SSL or IPSec
This attack involves victims being bombarded with false alarms and fictitious threats.
What is Scareware
What does PIPL stand for?
What is Personal Information Protection Law
TLS is managed by this Layer of the OSI Model
What is Presentation - L6
The movie "23" is loosely based on what real computer security engineer?
Who is Karl Koch. He died at 23 and was believed to be murdered by the KGB.
What flag or flags are sent in the segment during the second step of the TCP three-way handshake?
SYN-ACK
The scam is often initiated by a perpetrator pretending to need sensitive information from a victim to perform a critical attack task.
What is Pretexting
What Does LGPD stand for?
What is Lei Geral de Proteção de Dados or General Law on the Protection of Personal Dat
MACs are managed by this Layer of the OSI Model
What is Data Link - L2
What law did US President Ronald Reagan sign after viewing "War Games"?
What is the Computer Fraud and Abuse Act (CFAA)
What does hashing preserve in relation to data?
What is Data Integrity?
This attack chooses specific individuals and tailors their messages based on characteristics, job positions, and contacts belonging to their victims.
What is Spear Phishing/