The infamous 2013 data breach exposed over 3 billion accounts.
What is the Yahoo breach
Linux command used to display network interfaces.
What is ifconfig or ip a?
Security questions are an example of this authentication factor type.
What is knowledge-based authentication?
A threat actor hired by a company to simulate real attacks.
What is a red teamer?
This mobile feature isolates apps from accessing each other’s data.
What is sandboxing?
The worm that spread via USB drives in Iran’s nuclear facilities.
What is Stuxnet?
Tool used to crack Wi-Fi passwords.
What is Aircrack-ng?
A method where a system confirms that a login attempt comes from a legitimate device.
What is device-based authentication?
A nation-state cyber threat actor is often referred to as this.
What is a state-sponsored actor?
A common way attackers infect phones through text messages.
What is smishing?
This company suffered a breach in 2017 exposing sensitive credit data.
What is Equifax?
Tool used to generate and manage SSL certificates.
What is OpenSSL?
This access control model assigns permissions based on clearance levels.
What is Mandatory Access Control (MAC)?
An individual who exploits systems with no defined motive.
What is a script kiddie?
Mobile Device Management (MDM) is used for this.
What is securing, monitoring, and managing mobile devices?
Created the first antivirus software company.
Who is John McAfee?
Used to simulate brute-force attacks on login pages.
What is Hydra?
JSON-based token used to securely transmit claims between parties.
What is a JWT (JSON Web Token)?
This group often targets critical infrastructure with advanced malware.
What is a nation-state APT?
This type of wireless attack captures Wi-Fi handshakes for offline cracking.
What is a handshake capture attack?
The original purpose of the “Creeper” virus was to do this.
What is test computer self-replication?
This tool is used to detect and prevent intrusions in real-time.
What is Snort or Suricata?
Open standard for decentralized authentication, used by major platforms.
What is OAuth 2.0?
These attackers demand money to unlock or not leak data.
What are ransomware operators?
This protocol improves upon WPA2 by offering stronger encryption and forward secrecy.
What is WPA3?