Why did the computer go to the doctor?
Because it had a virus!
This security solution that monitors and responds to security incidents on endpoints, such as computers and mobile devices, providing visibility, threat detection, and response capabilities.
endpoint detection and response (EDR)
What is a weakness in a system that can be exploited.
Vulnerability
What inspects items with over 70 antivirus scanners, URL/domain blacklisting services, in addition to a variety of tools, and community feedback tab?
VirusTotal
What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Ransomware
Why don't hackers get invited to parties?
Because they always crash them!
In W/Secure under what tab for a specific Device would you check the status of a pushed scan?
Operations Tab
This ensures that data is accurate and unaltered.
Integrity
Name 3 toolkits you would use to check the reputation of any Hash, domain, or IP.
There are tons of correct answers.
What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
Phishing
Why was the computer cold?
It left its Windows open!
What allows you to investigate whether an operation has custom command-line arguments to load a module and if these arguments are expected or not?
Process Tree
This creates a secure connection over a less secure network by encrypting the data transmitted. It is used to protect sensitive data and maintain privacy.
VPN
This toolkit helps map out techniques and sub techniques, as well as profiles threat groups and associated TTPs
MITRE ATT&CK
What three attributes is the Fortinet Security Fabric built upon?
Aware, Scalable, Actionable
Why did the scarecrow become a cybersecurity expert?
Because he was outstanding in his field!
The steps of preparation, identification, containment, eradication, recovery, and lessons learned are all part of what?
Steps in an incident response process?
This monitors network traffic for suspicious activity and alerts administrators.
IDS (Intrusion Detection System)
What is a comprehensive cybersecurity tool that operates as a community-based IP blacklist database. It specializes in documenting and blocking malicious and suspicious IP addresses that pose potential threats?
Abuse IPDB
What does SOAR stand for?
Security, Orchestration, Automation & Response
Why do programmers prefer dark mode?
Because the light attracts bugs!
ensures that an organization can quickly and effectively restore operations after a significant disruption, minimizing downtime and data loss.
disaster recovery plan
A cybersecurity strategy that employs multiple layers of defense to protect information. If one layer fails, others continue to provide protection, thereby increasing overall security?
Defense in Depth
What is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education?
WireShark
What does the NSE say are Fortinet's main competitors? (Hint: 4 total)
Checkpoint, Cisco, Sophos, Dell SonicWall