This retail giant was hacked in 2013 via their HVAC vendor, leaking 40 million credit cards.
What is Target
What does MFA stand for?
What is Multi-Factor Authentication
This common attack involves sending fraudulent emails that appear to come from a reputable source to steal sensitive info
What is Phishing
In The Matrix, what color is the pill Neo takes to see the truth?
What is Red
The first rule of IT support: "Have you tried turning it _____?"
What is Off and on again
In 2017, this credit bureau failed to patch Apache Struts, leaking data on 147 million Americans
What is Equifax
What does VPN stand for?
What is Virtual Private Network
In this type of attack, a hacker encrypts a victim's files and demands payment (usually crypto) to unlock them
What is Ransomware
In Hollywood movies, no matter how complex the NSA security system is, the hacker always finishes the job by hitting one final key and whispering this two-word phrase.
What is "Im In"
What is the IP address 127.0.0.1 commonly called?
What is Localhost
The "WannaCry" ransomware attack famously used an exploit developed by which agency?
What is The NSA - EternalBlue
What does DDoS stand for?
What is Distributed Denial of Service
This attack involves flooding a website with so much junk traffic that it crashes and real users can’t access it.
What is a DDos attack
In the movie The Social Network, Mark Zuckerberg creates the site "FaceMash" by hacking into the student directories of which university?
To test if a server is online, IT pros use this 4-letter command which sends ICMP packets to the target and waits for a reply.
What is ping
For the last 10 years, this string of numbers has remained the #1 most common password in the world.
What is 123456
What does OSINT stand for?
What is Open Source Intelligence
This happens when an attacker secretly intercepts and relays communications between two parties who believe they are talking directly to each other (common on public Wi-Fi).
What is a Man-in-the-Middle attack
In Jurassic Park, Lex saves the day by hacking the door locks, famously saying, "It's a _____ system! I know this!"
What is Unix
An IP address can change, but this 12-character alphanumeric address is physically hard-coded into the network card and generally stays the same
What is the MAC address
The first ever "computer worm" released in 1988 was named after this grad student.
What is The Morris Worm / Robert Morris
What does XSS stand for?
Cross-Site Scripting
This automated attack takes millions of username/password pairs stolen from one data breach and tests them against other websites (like Netflix or Uber) to see if users reused their credentials.
What is Credential Stuffing
In the HBO show Silicon Valley, Gilfoyle creates a chat bot to talk to his coworkers so he doesn't have to. What is the bot's name?
What is Anton
What is "Esc + :wq"