He is commonly known as the "greatest social engineer", was jailed by the Feds, and was considered the "most dangerous hacker in the world".
Who is 'Kevin Mitnick'?
One of the main protocols used to retrieve mail from a server. While POP has wider support, ____supports a wider array of remote mailbox operations which can be helpful to users.
What is 'IMAP'?
Residing on the transport layer, this protocol features reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet
What is "TCP"?
Referred to as "Alias" in DNS-terms.
What is a "Cname record"?
A derogatory term for a new or unskilled hacker.
What is a script kiddie?
These are the ports used by DHCP to assign IP address information to a network device.
What are UDP ports 67 and 68?
This protocol is used for resolution of network layer addresses into link layer addresses
What is "ARP"?
The abbreviation behind 'the CIA triad'.
What is Confidentiality, Integrity and Availability?
An attack that involves trying every possible combination of letters, numbers, and special characters until the correct password is found.
What is a 'brute force attack'?
A computer system that is set up to act as a decoy to lure cybercriminals and to detect, deflect, or study attempts at unauthorized use of information systems.
What is a HoneyPot?
This protocol is the primary method used to manage network devices securely at the command level. It is typically used as a secure alternative to Telnet.
What is "Secure Shell or SSH"?
A famously sketched routing protocol was done on the back of some napkins, hence often referenced to as the “Two Napkin Protocol”
What is 'BGP' (BorderGatewayProtocol)?
This technology cryptographically signs an email
What is DKIM (DomainKeys Identified Mail)?
A cryptographic process that transforms any form of data into a unique fixed-size string of characters, which serves as a fingerprint for that data.
What is 'Hashing'?
Use of telephone communication to scam the user into surrendering private information that will be used for identity theft.
What is Vishing (Voice-phishing)?
A Windows IP diagnostic utility used to trace the route taken by a packet as it hops to the destination host on a remote network.
What is "tracert"
Per the Internet Assigned Numbers Authority (IANA), the GRE protocol is assigned this number.
What is "47"?
In 2013 this person leaked classified documents revealing the existence of global surveillance programs.
Who is 'Edward Snowden'?
A number or bit string used only once, in security engineering, during an authentication process or cryptographic communication. This prevent old communications from being reused in replay attacks.
What is 'Nonce'?
A command-line packet-sniffing utility.
What is "tcpdump"
Version 1 of this protocol was originally introduced in RFC 1945 and later updated in RFC's 2068 and 2616.
What is "HTTP" (Hyper-Text-Transport-Protocol)?
These tree people are responsible for one of the oldest widely used public-key cryptosystems for secure data transmission.
Who are 'Ron Rivest, Adi Shamir and Leonard Adleman'?