Cybersecurity - Tools & Techniques
Cyber Attacks & Vulnerabilities
Zscaler
Olympics
Emoji
100

________ is a hacking technique that involves collecting data packets that travel through an unencrypted computer network.

Packet sniffing

100

Which fraudulent practice involves making phone calls to trick victims into providing sensitive information, like login credentials, credit card numbers, or bank details

Vishing (voice phishing)

100

Who was co-founder of Zscaler along with Jay?

Kailash Kailash

100

Where will the 2028 Olympic Games be held?

United States

100

Guess the term from this emoji?

0οΈβƒ£πŸš«πŸ€

Zero Trust

200

________ is a cybersecurity framework that requires healthcare organizations to implement controls for securing and protecting the privacy of electronic health information.

Health Insurance Portability and Accountability Act (HIPAA)

200

What do you call a Malware that does not replicate or clone through infections?

Trojans

200

Why did Zscaler not secure any quadrant in the recent Gartner's magic quadrant for Single vendor SASE report?

Zscaler requires customer to use 3 or more management consoles to operate the SaaS offering.

200

Name the sport in which a Singaporean won the Gold Medal?

Swimming

200

Guess the term?


πŸ”’πŸ’»πŸ”’πŸ“±

MFA

300

An _______ is a device or software application that monitors a network for malicious activity or policy violations.

Intrusion detection system (IDS)

300

What qualitative rating system is used to determine the severity of a vulnerability?

The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity. The numerical score can then be translated into a qualitative representation (such as low, medium, high, and critical) to help organizations properly assess and prioritize their vulnerability management processes.

300

Which Zscaler solution would you recommend for prospect and existing customers using VDI for web only applications (both SaaS and private apps)

Cloud Browser Isolation (CBI)

300

In Tennis, what is a golden slam?

Having won each of the four Grand Slam tournaments (Australian Open, French Open, Wimbledon, US Open) as well as an Olympic Gold medal.

300

πŸ”πŸ…ΎοΈπŸ“Š

Guess the term?


Cryptography

400

_______ is a cybersecurity solution that uses algorithms and machine learning to detect anomalies in the behavior of not only the users in a corporate network but also the routers, servers, and endpoints in that network.

User and entity behavior analytics (UEBA)

400

________ is a type of cyberattack in which threat actors exfiltrate a victim’s sensitive data in addition to encrypting it, giving the criminal additional leverage to collect ransom payments

Double extortion ransomware

400

Which tool would you use to acquire competative intelligence?

Klue

400

Which sport in Summer Olympics until 1992, required male competitors to be under 23 years old, and since 1996, a maximum of three over-23-year-old players have been allowed per squad?

Football

400

Guess the cybersecuirty movie name

πŸŒπŸ’¬πŸ‘₯πŸ”—

The Social Network

500

What are the five Functions of NIST Cybersecurity Framework?

Identify, Protect, Detect, Respond, and Recover

500

________ is a type of cyberattack that leverages domain name system (DNS) queries and responses to bypass traditional security measures and transmit data and code within the network.

DNS Tunneling

500

Zscaler aquired _____  a SaaS application security platform innovator and who's platform is desinged to prevent organizations' growing risks of SaaS supply chain attacks.

Canonic Security

500

In 2008, whose record did Michael Phelps break to win a record number of most gold medals, in a single edition of Summer Olympics? 

Mark Spitz

500

Guess the cybersecurity movie name


πŸπŸ§‘β€πŸŒΎ

The Beekeeper