The process of concealing code or text inside a graphical image
What is Steganography?
A cyberattack where scammers use text messages to trick people into revealing sensitive information
What is SMiShing?
A protocol for secure remote login and command execution, ensuring encrypted communications for remote administration. Protocol and Port.
What is SecureShell - 22?
One of the two main IPSec protocols, it provides encryption, integrity, and authentication
What is (ESP) Encapsulating Security Payload?
A method or tool that can be used to detect and study attackers after they have successfully infiltrated a network.
What is a honeypot?
DAILY DOUBLE - A defensive strategy designed to prevent rogue endpoints from connecting to network infrastructure
What is Port Security?
A software vulnerability where a program writes more data to a temporary memory storage area than it can hold - corrupting data, crashing programs, or allowing attackers to inject malicious code
What is Buffer Overflow?
It provides remote shell access over TCP and offers no encryption, transmitting in plain text.
What is Telnet - 23?
A strategy and set of tools designed designed to detect, monitor, and prevent the unauthorized transmission or exposure of sensitive data
What is (DLP) Data Loss Prevention?
A security alerting and monitoring tool that collects system, application, and network logs from multiple sources in a centralized system
What is a (SIEM) Security Information and Event Management?
The process of adding a random character string to a password to prevent a hacker from cracking it
What is Salting?
An attack in which web services may appear to be up and available, but a sudden spike in network traffic causes them to be inaccessible by the public
What is DoS or DDoS (Denial or Distributed Denial of Service)?
A protocol for sharing files, printers, and other network resources among computers, primarily in Windows environments.
What is SMB - 445?
DAILY DOUBLE - It defines how much data loss an organization can tolerate during a disaster
What is (RPO) Recovery Point Objective?
As part of a DRP it aids in recovery while keeping costs to a minimum and may have an RTO of days or weeks
What is a Cold Site?
An encryption method in which the same key is used to both encrypt and decrypt a message sent to a coworker or peer
What is Symmetric Encryption?
DAILY DOUBLE - In digital forensics, the contents of this are considered the most volatile and should be collected first.
What is RAM?
A standardized protocol for forwarding log messages in an IP network, enabling centralized logging of events from various systems and network devices.
What is Syslog - 514?
A structured process used to design, develop, test, and maintain high-quality software efficiently and cost-effectively
What is (SDLC) Software Development Life Cycle?
Host discovery and port/service/OS scanner for security auditing and network inventory.
What is nmap?
Released in 1962, it was the first James Bond movie to star Sean Connery.
What is Dr. No?
A great leader who invented the "Buffalo Horns" battlefield formation, consisting of Chest, Horns, and Loins components that revolutionized combat in the 19th century
Who is Shaka Zulu?
He owns the NFL's career interception record with 336 thrown. Averaging over 1 per game.
Who is Brett Favre?
Released in 2001, it starred John Travolta and Don Cheadle. It follows the hacking adventures of Stanley Jobson and his "hydra". Its iconic opening bank-heist scene was filmed using 135 cameras to capture a 360 degree effect
What is Swordfish?
He holds the MLB career singles record with 3,299 hit.
Who is Ty Cobb?