Cyber Threat Intelligence
Identity Access Management
SSG(Application Security)
Customer Service
Potpourri
100

This framework maps cyber-adversary behaviors across phases like Initial Access and Lateral Movement.

What is MITRE ATT&CK?

100

This standard allows identity providers to pass authentication and authorization data to service providers, commonly used for SSO.

What is SAML?

100

This technique is used to slow down bot traffic

What is Rate-limiting?

100

Customers can contact customer service through these two channels

What are Phone and Chat?

100

What is the closest star to us?

What is The Sun?

200

Frequently analyzed in U.S. Cyber Command and ODNI threat assessments, these four nation-states form the core set of strategic cyber adversaries—each known for distinct tradecraft, including supply-chain compromises, destructive wiper malware, election interference, and cryptocurrency-driven operations to evade sanctions.

Who are Russia, China, Iran, and North Korea?

200

This principle states that a user should have the minimum access necessary to perform their job.

What is least privilege?

200

This is the first stage of an attack

 What is Recon/Enumeration?

200

This application was built to replace Oracle, saving more than $5 million.

What is Kohl's 360?

200

This mighty river carved the Grand Canyon 

What is the Colorado River?

300

 This highly sophisticated malware campaign, discovered in 2010, is often cited in CTI as the first known cyber operation to cause physical destruction, targeting industrial control systems in Iran’s nuclear program.

What is Stuxnet?

300

The holiday workshop implemented hardware security keys for staff. This form of authentication is resistant to phishing attacks.

 What is FIDO2/WebAuthn/Yubikey?

300

This popular test is intended to differentiate humans from bots

What Is Captcha?

300

Customer service agents are projected to take over 750K calls and  666K inquiries from this contact method during peak season

What is Chat?

300

This person wrote the poems in A Light in the Attic and Where the Sidewalk Ends

Who is Shel Silverstein?

400

This social-engineering–heavy threat actor group, known for SIM swapping, MFA fatigue attacks, and targeting help desks for initial access, has been linked to high-profile breaches across hospitality, retail, and entertainment industries.

 Who is Scattered Spider (a.k.a. Octo Tempest / UNC3944)?

400

This type of attack attempts billions of login combinations using stolen password datasets.

 What is credential stuffing/password spraying?

400

The SSG uses this tool to intercept, inspect, and modify HTTP requests to find vulnerabilities

What is Burp?

400

 Chat servicing was migrated off of Ada to this provider, creating annual savings of $700K.


What is Genesys?

400

Brazil’s capital city, Brasilia, was designed to look like what on a map?

What is an airplane?

500

This adversary-modeling framework characterizes threat actors based on observable behaviors, including their tradecraft, infrastructure, and attack patterns, rather than attribution alone.

What is the Diamond Model?


500

 This protocol, built on top of OAuth 2.0, adds identity information via ID tokens.

What is OpenID Connect (OIDC)?

500

This prevents unapproved sites and Javascript from being injected into our webstore pages, and helps prevent Magecart-like attacks

What is Content Security Policy - CSP ?

500

Customer service agents can obtain payment information from customers to place orders for them using what technology

What is IVR?

500

The Great Lakes form part of our border with Canada. Name all five of them.

Huron, Ontario, Michigan Erie and Superior

M
e
n
u