Whose Line is It Anyway
Hollywood Hacking
Fireworks & FortiGates
MITRE
SEC+
100

"Its Friday Eve guys, almost ready for Happy Hour"

Wes and his Shirley Temple 

100

This 2021 Amazon-owned streaming platform suffered a massive data breach that exposed source code, creator payouts, and internal tools. The leak, posted on 4chan, was reportedly over 125GB.

Twitch

100

 What is the primary function of FortiGate?

provides comprehensive network security through traffic filtering and access control. 

100

What do the tactics represent?

Represent the goals or objectives of an attacker

100

This principle ensures users have only the access they need to perform their jobs?

Rule of Least Privilege

200

"Alright guys Dad joke of the week"

Mr. Trout 

200

Considered one of the most infamous breaches ever. "The Guardians of Peace" leaked unreleased films, executive emails, and employee data from this 2014 breach.

Sony

200

Which protocol is primarily used by FortiGate for SSL VPN?

HTTPS

200

In Jira, what two label types are required minimum?

at least 1 technique and 1 tactic

200

Name one way to protect data in transit from eavesdropping. 

VPN, Encryption, TLS/SSL

300

"GOOD MORNING DEFENDEDGE HAPPY FRIDAY"

Hunter 

300

in 2017, hackers stole 1.5 terabytes of data, including unaired episodes of Game of Thrones, scripts, and internal emails. The attackers demanded millions in Bitcoin.

HBO

300

Which tool can be used to back up FortiGate configurations?


FortiManager

300

Describe the Initial Access (TA0001) tactic:

The adversary is trying to get into your network

300

What authentication factor is a fingerprint considered?

Something you are
400

"For new Threat Actors this Week"

Krysten

400

What production company working on Orange Is the New Black was breached by "TheDarkOverlord", who threatened to release the entire season unless a ransom was paid?

Netflix

400

Which feature helps FortiGate detect and block malicious web traffic?

Web Filtering

400

Describe the Reconnaissance (TA0043) tactic:

The adversary is trying to gather information they can use to plan future operations

400

What type of attack involves intercepting and altering communications between two parties.

Man-In-The-Middle

500

"No New WithSecure Updates this week"

Eric 

500

This company being attacked twice in 24'/25' had hacktivist group Nullbulge claim they stole over 1TB of internal Slack data, in sensitive studio info and communications and their Paris location hit by ransomware.

Disney

500

What is FortiGate's UTM?

Unified Threat Management
(Refers to an all-in-one security solution that integrates multiple security features into a single device)

500

How many tactics are there [in Jira]?

All 14 are in Jira

500

What is the difference between hashing and encryption?

Hashing is a one-way process to ensure data integrity, while encryption is a reversible process and it can ensure confidentiality.