This gentlemen used to work as a contractor for the NSA and CIA, but he decided to be a whistleblower
Who is Edward Snowden
This is a 7-layer model - no, this is not a dip!
What is the OSI 7-Layer Model
The year Estonia had a bad day...
What is 2007
If you make these too short or too easy they are easily "cracked"
What are passwords
There are how many bits in a byte
What are 8 bits to 1 byte
OPM was hacked during a cyber attack from this country
What is allegedly China
This layer provides services for an application program to ensure that effective communication with another application program in a network is possible
What is the 7th layer - Applications Layer
ARPANET invented the Internet and TCP/IP traffic when
What is 1983
This method of destruction cuts the paper into tiny shards...
What is shredding?
A million gigabytes equals 1 of these...
What is a petabyte
When you attack after you have been attacked, it is called
What is cyber counterterrorism
This is the year supposedly the US and Israel got together to really try and "shake things up" in Iran
What is the year 2010
the ability to prepare for and adapt to changing conditions and withstand and recover rapidly from disruptions
What is cyber resilience
The most widely accepted code is called
What is ASCII - American Standard Code for Information Interchange
This type of testing is used by a white hat hacker to test the security of a network
What is a penetration test
OSI Acronym Stands for
What is Open Systems Interconnect
The year of the net neutrality controversy
What is 2017
Is a part of a system that, if it fails, will stop the entire system from working
What is the electrical grid
A database in which information about every file and directory on an NT File System (NTFS) volume is stored
What is a Master File Table
The subversive use of computers and computer networks to promote a political agenda or a social change
What is known as hacktivism
Two different types of models...one has _ layers and the other has __ layers.
What is 7 or 4 or 4 or 7?
Apple would not allow the FBI to "crack" into the iPhone in this year after a terror attack in California
What is the year 2015
A model designed to guide policies for information security within an organization - think triad
What is the CIA Triad
A hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network
What is a Domain Name System