I already forgot this
Tracking The Wicked
Disinform Me Please
OSINTSual
Creepiness
100

This type of firewall is generally thought of as the most common

What is Packet Filtering?

100

The term refers to a group of cyber actors who use a certain type of TTP to enter and stay in networks without authorization

What is an Advanced Persistant Threat (APT)?

100

This technology is the usual way deepfakes are created

What are generative adversarial networks or GAN?

100

Internet searches often done with advance string indicators can be described by this technique?

What is Google Dorking?

100

This browser allows you to stay anonymous while on the internet and is a favorite of hackers, criminals and journalists

What is TOR?

200

This type of intrusion technique can be achieved by using URL commands to take advantage of flaws in a web page

What is cross site scripting?

200

This open source forensic tool can do multiple types of scans on disks, USBs or Mobile Devices and is available on Windows

What is Autopsy

200

This place is really not out in the country and does not have animals but does have people making fake social media accounts by the thousands

What is a troll farm?

200

A wonderful free tool which can tell the user very specific information about a domain name

What is Whois?

200

This company conspired with Facebook and others to target voters in the 2016 election based on their user history

Who is Cambridge Analytics?

300

This nasty software can be effective to record user typing data 

What is a keylogger?

300

This term of art refers the the entire hacking process and includes such things as persistence

What is the Cyber Kill Chain?

300

Phishing emails are often successful using this theme on the user, whether it be good, bad or authoritative

What is a sense of urgency?

300

This search engine scans the internet for connected devices and has a free trial

What is Shodan?

300

A common name for a fake social media account often used by OSINT professionals and hackers to gather information on a target

What is a sock puppet?

400

A really mean wifi attack that convinces user to login to a fake access point that looks legitimate

What is an evil twin?

400

This evidence preservation technique requires investigators to use tools such as FTK to accomplish

What is disk imaging?

400

A type of trap set for hackers by the target network leading them to fake data, corrupted links, or reverse encryption.

What is a honeypot?

400

This individual is the current top expert in your instructor's eyes on the subject of social engineering

Who is Chris Hadnagy?

400

This social media site has been banned on US Government Devices due to valid concerns of stealing user information

Who is Tik Tok?

500

This OS directory runs on NET commands and is a primary choice of hackers to run their own scripts

What is Windows PowerShell?

500

An organization funded by the US Government that keeps track of such things as Common Vulnerabiliies and Exposures, while also promoting their own version of the Cyber Kill Chain

Who is MITRE?

500

This law if amended could hold social media companies liable for not detecting and removing disinformation in a timely fashion

What is Section 230 of the Communications Decency Act?

500

A simply named webpage which is the supersite of open source intelligence tools by category

What is OSINT Framework?

500

This source of information can show things like where images were created, whether they were altered and what type of device created them

What is metadata?