Cyber Spooks
Haunted Hardware
Trick-or-Treat Tech
Monstrous Misconfigurations
Leftover Tricks and Treats
100

A spooky-sounding malware locks your files until you pay a ransom.

What is Ransomware?

100

The brain of the computer that processes instructions?

What is the CPU (Central Processing Unit)

100

An operating system mascot is a friendly penguin named Tux.

What is Linux?

100

Leaving this default account active is a common IT “sin”.

What is the Administrator account?

100

This notorious slithering payload from 2000 spread through email with the subject “ILOVEYOU.”

What is a worm?

200

A Which cybersecurity tool detects “phantom” network intrusions by analyzing traffic patterns.

What is an Intrusion Detection System (IDS)?

200

The small piece of firmware that “awakens” the computer from its grave (cold start).

What is the BIOS or UEFI?

200

The name of Microsoft’s cloud platform.

What is Azure?

200

This is when sensitive data is left unencrypted on a public S3 bucket.

What is data exposure or cloud misconfiguration?

200

A 2017 ransomware outbreak that disguised itself as Petya but was far more destructive.

What is NotPetya?

300

In threat hunting, a term that describes residual traces left behind by an attacker.

What are Indicators of Compromise (IOCs)?

300

A tiny chip stores encryption keys and is used for secure boot.

What is the TPM (Trusted Platform Module)?

300

The port number is used for HTTPS traffic.

What is 443?

300

Types of attacks for open RDP ports.

What are brute-force or remote access attacks?

300

The PowerShell command to get a list of running processes.

What is Get-Process?

400

A malware, named after a poltergeist, targeted Iranian nuclear facilities.

What is Stuxnet?

400

The nickname for malicious USB devices that mimic keyboards to execute payloads.

What is a Rubber Ducky?

400

This translates a domain name into an IP address.

What is DNS?

400

The principle of granting only the access rights necessary to perform a job.

What is the Principle of Least Privilege?

400

This type of encryption uses the same key to encrypt and decrypt.

What is symmetric encryption?

500

A cyberattack method manipulates domain name system queries to redirect victims to “haunted” websites.

What is DNS spoofing or cache poisoning?

500

A security vulnerability class allows attackers to flip DRAM bits turning memory errors into exploits.

What is Rowhammer?

500

A networking command-line tool can display active connections and listening ports?

What is netstat?

500

The security control framework that uses “Identify, Protect, Detect, Respond, Recover” as its core functions.

NIST CSF

500

This PowerShell cmdlet disables a user in Active Directory.

Disable-ADAccount