What does the acronym VPN stand for?
What is Virtual Private Network?
In 2021, this software company’s supply chain was compromised, affecting thousands of customers including U.S. federal agencies.
What is SolarWinds?
This Linux distribution is popular among penetration testers.
What is Kali Linux?
A common meme password often used in examples.
What is "password123"?
The three core components of the CIA Triad.
What are Confidentiality, Integrity, and Availability?
This type of attack tricks users into revealing sensitive information.
What is phishing?
In 2017, this ransomware attack affected over 200,000 computers globally.
What is WannaCry?
A popular tool for scanning open ports.
What is Nmap?
This hacker group is known for the Guy Fawkes mask.
Who is Anonymous?
SQL injection vulnerabilities often begin with what character?
What is a single quote (')?
The process of converting data into a coded form to prevent unauthorized access.
What is encryption?
Kevin Mitnick was once known as the FBI’s most wanted ___.
What is hacker?
This tool is often used to find hidden files and directories on web servers.
What is Gobuster?
In hacker culture, the number “1337” is often used to mean what?
What is leet or elite?
This attack intercepts communication between two parties without their knowledge.
What is a Man-in-the-Middle attack?
The most common default port for HTTP traffic.
What is port 80?
The company that suffered a massive breach in 2013 exposing over 3 billion accounts.
What is Yahoo?
A framework used to develop and execute exploit code against remote targets.
What is Metasploit?
This yearly hacker convention held in Las Vegas is famous for its Wall of Sheep and badge hacking.
What is DEF CON?
CVE stands for?
What is Common Vulnerabilities and Exposures?
What cybersecurity principle refers to giving users the least access necessary?
What is the Principle of Least Privilege?
This exploit allowed attackers to extract information from a supposedly secure area of memory in CPUs (hint: 2018 disclosure).
What is Spectre or Meltdown?
Name the tool famous for intercepting and modifying HTTP requests.
What is Burpsuite?
Mr. Robot’s real identity is revealed to be this person in Elliot’s life.
Who is Elliot’s father?
Name the encryption algorithm commonly used in WPA2 wireless security.
What is AES (Advanced Encryption Standard)?