Andrews Dad Jokes
WithSecure-EDR-AV
Anything SOC
Toolkits
NSE
100

Why did the computer go to the doctor?

Because it had a virus!

100

This security solution that monitors and responds to security incidents on endpoints, such as computers and mobile devices, providing visibility, threat detection, and response capabilities.

endpoint detection and response (EDR)

100

What is a weakness in a system that can be exploited.

Vulnerability

100

What inspects items with over 70 antivirus scanners, URL/domain blacklisting services, in addition to a variety of tools, and community feedback tab?

VirusTotal

100

What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?

Ransomware

200

Why don't hackers get invited to parties?

Because they always crash them!

200

In W/Secure under what tab for a specific Device would you check the status of a pushed scan?

Operations Tab

200

This ensures that data is accurate and unaltered.

Integrity

200

Name 3 toolkits you would use to check the reputation of any Hash, domain, or IP.

There are tons of correct answers.

200

What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?

Phishing 

300

Why was the computer cold?

It left its Windows open!

300

What allows you to investigate whether an operation has custom command-line arguments to load a module and if these arguments are expected or not?

Process Tree

300

This creates a secure connection over a less secure network by encrypting the data transmitted. It is used to protect sensitive data and maintain privacy.

VPN

300

This toolkit helps map out techniques and sub techniques, as well as profiles threat groups and associated TTPs

MITRE ATT&CK

300

What three attributes is the Fortinet Security Fabric built upon?

Aware, Scalable, Actionable

400

Why did the scarecrow become a cybersecurity expert?

Because he was outstanding in his field!

400

The steps of preparation, identification, containment, eradication, recovery, and lessons learned are all part of what?

Steps in an incident response process?

400

This monitors network traffic for suspicious activity and alerts administrators.

IDS (Intrusion Detection System)

400

What is a comprehensive cybersecurity tool that operates as a community-based IP blacklist database. It specializes in documenting and blocking malicious and suspicious IP addresses that pose potential threats?

Abuse IPDB

400

What does SOAR stand for?

Security, Orchestration, Automation & Response

500

Why do programmers prefer dark mode?

Because the light attracts bugs!

500

ensures that an organization can quickly and effectively restore operations after a significant disruption, minimizing downtime and data loss.

disaster recovery plan

500

A cybersecurity strategy that employs multiple layers of defense to protect information. If one layer fails, others continue to provide protection, thereby increasing overall security?

Defense in Depth

500

What is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education?

WireShark

500

What does the NSE say are Fortinet's main competitors? (Hint: 4 total)

Checkpoint, Cisco, Sophos, Dell SonicWall

M
e
n
u