Name the three Cybersecurity Clubs on campus
What is Ethical Hacking, Cyber Defense, and Wicys?
Command to test if a machine is active on your network
What is ping?
The facility dog at ERAU
Who is Higbee (Shameless plug @handsome_huggable_higbee)
True or False: Digital forensics and data recovery refer to the same activities
What is false?
A piece of software that is intended to perform unwanted
activities on a machine
What is malware?
Confidentiality, Integrity, Availability
What is the CIA triad?
Application that allows you to capture network traffic in real time
What is Wireshark?
A password that is limited to only numbers
What is a PIN? (Personal Identification Number)
Encryption technique that shifts each letter of a message by a fixed number of positions down the alphabet
What is a Caesar Cipher?
A covert cyber attack where the threat actor gains unauthorized access to a computer network and remains undetected for an extended period of time
What is APT (Advanced Persistent Threat)?
The number two in binary
What is 0011?
A cyberattack in which the attacker intercepts and alters data as it is transmitted between two parties
What is Man in the Middle Attack?
What error accounts/(causes) for the majority of data breaches?
What is human error?
Police in the U.S. must use procedures that adhere to which amendment?
What is the fourth amendment?
an environment should always be used when performing dynamic analysis to
prevent the malware from spreading to undesired locations
What is a sandbox?
A security professional who uses their skills to find weaknesses in systems to protect them from digital threats.
What is a White Hat Hacker?
The default port for HTTP
What is Port 80?
A type of identity-based data whose examples include fingerprints, DNA, and handwritten text?
What is Biometric data?
Technique that recover lost data from broken hard drives, crashed servers, and other compromised devices
What is Data Recovery?
What is the function call in assembly code when there's a conditional jump if something is not equal to zero?
Application-Presentation-Session-Transport-Network-Data Link-Physical
What is the OSI Model?
The loopback IP address
What is 127.0.0.1?
Dr. Sampigethaya's first name
Who is Radhakrishna?
A common software reverse engineering tool created by the NSA
What is Ghidra?
a small amount of data storage available to the CPU, whose contents can be accessed more quickly than storage available elsewhere
What is a register?