Security Practice
Sports
Movies
North America
Security Cyber Attacks
100

What are the common types of malware that threatens network security? 

Common types of malware include viruses, worms, trojans, ransomware, and spyware, each with different methods of exploitation and impact.

100
What is the most popular sport in the word? 

Football, Soccer

100

What 90's movie is this line

"Life is like a box of chocolates; you never know what you're gonna get."



Forrest Gump

100

What is the famous bridge in California?

What is is the Golden Gate Bridge?
100

Which major social media platform experienced a data breach in 2019 affecting around 500 million users accounts, where phone numbers were exposed?

Facebook, and the breach exposed phone numbers and other personal data or users. 

200

Explain the difference between symmetric and asymmetric encryption.

Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a pair of keys (public and private) for the same process. 

200

What a team leader called?

Captain

200

In Clueless Alicia Silverstone responds to male advances with this two - work phrase


"As if"

200

Where is Parliament Hill? 

What is Ottawa, Ontario Canada? 

200

Which infamous cyber attack against Sony Pictures in 2014, resulted in the leak of unreleased films and private employee data?  

The Cyber attack was attributed to the "guardian of Peace," and it led to significant financial loss and confidential information. 

300

What is a firewall and how does it contribute to network security? 

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules, helping to prevent unauthorized access.

300

You only need a pair of legs and a pair of shoes and the fastest person win?

Running or Track

300

Movie Rules

The second rule of this movie's, club is the same as the first. But rule number six is "No shirts, no shoes"

Fight Club

300

Where is the Freedom Trail located? 

What is Central Boston?

300

What was the primary exploit used in the Target data breach of 2013, and how many customers records were affected? 

Primary exploit was a comprised third party vendor credentials, and approximately 40 million credit and debit card accounts were affected.  

400

What are the primary goals of network security?

Th primary goals of network security are to ensure confidentiality, integrity, and availability of data and resources
400
What is the place called where two people fight ?

The ring

400

1992 Films

Tom Hanks: " Are you crying? There is no crying. There no crying ________"

Baseball

400

Where was the Declaration of Independence signed?

What is Independence Hall?

400

What significant vulnerability played a role in Equifax Data Breach in 2017, and approximately how many Americans information was exposed? 

The vulnerability was related to the Apache Struts framework, and roughly 147 million Americans personal information was exposed. 

500

What is the purpose of a Virtual Private Network (VPN) in terms of network security?

A VPN provides a security and encrypted connection over a less secure network, allowing users to send and receive date safely as if they were directly connected to a private network.

500

What is a form of fighting where punching is NOT ALLOWED? It is the oldest sport in the world.

Wrestling

500

1990 Best Picture by the Tagline

Directed by Spielberg: 

"Whoever saved one life, saved the world entire."

Schindler's List
500

Where is Catskill Mountains? 

What is New York?

500

What ransomware attack in 2017 affected thousands of organizations globally and exploited a vulnerability in Microsoft windows?

The ransomware attack WannaCry, which affected many organizations including the UK National Health Service