This layer of the OSI model is responsible for IP addressing.
What is the Network Layer?)
This type of email attack tricks victims into revealing sensitive info.
What is phishing?
OSINT stands for…
What is Open-Source Intelligence?
This cipher shifts letters by a fixed number.
What is Caesar cipher?
This device inspects network traffic and blocks packets based on a rule-set; it sits at network borders.
What is firewall
Port 443 is typically used for this secure protocol.
What is HTTPS?
Malware that locks files and demands payment is called…
What is ransomware?
This site is often used to look up old versions of websites.
What is the Wayback Machine?
SHA-256 is this type of function.
What is a hashing algorithm?
An IDS that runs on a host (not the network) and monitors local logs & system calls is called…
What is HIDS
This protocol translates domain names to IP addresses.
What is DNS?
This attack floods a target with traffic to make it unavailable.
What is a DDoS?
The tool theHarvester is commonly used to gather what?
What is Emails & domains
RSA relies on the difficulty of factoring large…
What are prime numbers?
Signature-based detection looks for known patterns. Name one drawback of signature-based IDS.
What is Zero Day
Which Wi-Fi security protocol is considered most secure today: WEP, WPA2, WPA3 or WPA4 ?
What is WPA3
Exploiting a web app by injecting SQL queries is called…
What is SQL Injection?
This tool can scan GitHub repositories to uncover sensitive information like API keys or passwords.
What is GitLeaks
Which key type is shared in symmetric encryption?
What is the secret key?
Name the open-source network IDS that uses rules/signatures and is popular for learning and labs.
What is snort / What is suricata
This type of attack spoofs ARP messages to reroute traffic.
What is ARP poisoning?
A zero-day exploit targets what?
A vulnerability unknown to the vendor.
What Google search operator would you use to find login pages?
What is inurl:login?
If N = 55, the prime factors are?
What are 5 and 11?
SIEM stand for
Security Information and Event Management?