This attack targets applications by injecting code directly into an application’s memory.
Memory Injection
This principle suggests that users should only have the permissions necessary to perform their job.
Principle of Least Privilege
In cybersecurity, the three core principles that protect data are known as this triad.
CIA Triad
This famous pop singer, originally part of the boy band NSYNC, became a major solo artist with hits like “Cry Me a River”
Justin Timberlake
Name 4 of the 7 wonders of the world
A pitch
In this type of attack, hackers exploit session cookies to impersonate a user.
Replay Attack
These types of passwords help prevent privilege escalation by being harder to guess
Strong Passwords
What is a technique used to manipulate people into revealing sensitive information?
Social engineering
Name 3 Justin Bieber Songs
?
What car was rapper Easy-E driving on his way to the park to get the scoop, before he saw knuckle heads out there just shootin some hoops?
64 Chevy Impala (SIX FO)
An attack where malicious code is hidden in a software update file
Malicious Update Attack
The type of escalation when an attacker accesses functions belonging to another user with the same privilege level
Horizontal Escalation
What is a vulnerability that is unknown to the software vendor?
Zero-day exploit
"Once Upon a Time in Hollywood" Directed by Quinton Tarintino is based on what serial killer and his family?
The Manson Family
Name 1 out of 2 Presidents who have served multiple, non-consecutive terms.
Grover Cleveland , Trump
This attack is an attempt to access files in directories above the application's base directory.
Directory Traversal Attack
A method of securing data by encoding it in a way that only authorized parties can read it.
Encryption
Regularly monitoring logs is a security measure to detect unusual activity that could indicate this.
Security Breach
This 1985 film, directed by John Hughes, centers around a high school student skipping class and exploring Chicago in a Ferrari.
Ferris Bueller's Day Off
Structured Query Language
This type of attack involves accessing higher privilege levels, like an admin account, without permission
Privilege Escalation
The term for when code is inserted into a web app's data to manipulate outputs.
Injection Attack
Programming languages like Python and Java help defend against this type of attack because of their built-in controls.
Overflow Attacks
This 1991 film, starring Jodie Foster and Anthony Hopkins, features a psychiatrist trying to track down a serial killer while seeking the help of an incarcerated cannibalistic killer.
The Silence of the Lambs
What is Kurt Cobains Birthday
February 20th