Compliance Alphabet Soup
Climbing the (OSI) Ladder
Hacking in Movies
L33t Sk1llz
Social Engineering
100

What does GDPR stand for?

What is General Data Protection Regulation 

100

HTTP is managed at this Layer of the OSI Model

What is Application- L7

100

In "V for Vendetta" this character literally became the face of the hacking group Anonymous

What is V or Guy Fawkes

100

Which record will reveal information about a mail server for a domain?

What is a MX record

100

This tactic uses a false promise to pique a victim’s greed or curiosity. 

What is a Baiting attack

200

What does CCPA stand for?

What is the California Consumer Privacy Act 

200

TCP and UDP use this Layer of the OSI Model

What is Transport - L4

200

In the "Matrix" what is Neo's real name?

What is Thomas Anderson

200

SNMP is used to do what? 

What is monitor network devices

200

This is the most popular social engineering attack today

What is Phishing

300

What dies POPIA stand for?

Protection of Personal Information Act

300

IPs are assigned in this Layer of the OSI Model

What is Network - L3

300

What are the group of Hacktivists called in "Mr. Robot"?

What is "fsociety"

300

What should a VPN over wireless use for tunneling?

What is SSL or IPSec

300

This attack involves victims being bombarded with false alarms and fictitious threats. 

What is Scareware

400

What does PIPL stand for?

What is Personal Information Protection Law 

400

TLS is managed by this Layer of the OSI Model

What is Presentation - L6

400

The movie "23" is loosely based on what real computer security engineer?

Who is Karl Koch.  He died at 23 and was believed to be murdered by the KGB.

400

What flag or flags are sent in the segment during the second step of the TCP three-way handshake?

SYN-ACK

400

The scam is often initiated by a perpetrator pretending to need sensitive information from a victim to perform a critical attack task.

What is Pretexting

500

What Does LGPD stand for?

What is Lei Geral de Proteção de Dados or General Law on the Protection of Personal Dat

500

MACs are managed by this Layer of the OSI Model

What is Data Link - L2

500

What law did US President Ronald Reagan sign after viewing "War Games"?

What is the Computer Fraud and Abuse Act (CFAA)

500

What does hashing preserve in relation to data?

What is Data Integrity?

500

This attack chooses specific individuals and tailors their messages based on characteristics, job positions, and contacts belonging to their victims.

What is Spear Phishing/

M
e
n
u