Which OWASP Top 10 Category does Local File Inclusion fall into?
What is Broken Access Control?
Anti-virus, EDR, host hardening and patching are examples of?
Endpoint Security
Ilang letters ang pangalan ni Lester sa Facebook?
13 (JhnLstrSAsprc)
What is the largest planet in our solar system?
Jupiter
What is 28?
256
RSA and ECC are examples of which type of encryption system?
What is Asymmetric Encryption?
The βSβ in HTTPS stands for this magical word that makes everything safer.
Secure
San to? H58F+49.
Cattleya Resort (Google Maps)
What country is this flag? πΏπ¦
South Africa
If the square root of 36 is 6, ilang letters ang full name ni boss Zandro? (First & Second name + Last)
22
When a string is transformed into another format so that it can be safely transmitted over networks or stored, but no cryptographic security is added, what is this process called?
What is encoding?
This public site can reveal if your email was part of a data breach
HaveIBeenPwned
Ano ang bio ni sir Tophs sa Instagram?
Meow.
How many OffSec members does RR have (from Manager to Analyst)?
16
Solve for x: 12x β 35 = 109.
12
Which protocol uses port 389 and is frequently enumerated during internal tests?
What is LDAP?
It is the counterpart of the CIA Triad.
DAD Triad
Ano ang name nung nagtitinda sa jollijeep ng chicken? (Kena ate chicken)
Aling Rose (Google Maps)
In the Avengers: Endgame movie, who wields Mjolnir besides Thor in the final battle?
Captain America
Convert the binary number 101010 to decimal.
42
What is -x?
This process systematically maps attack vectors and analyzes potential threats and vulnerabilities.
Threat Modeling
Sa picture ng RR sa #clubbalaiisabel, ano ang kulay ng sando ni sir Ray?
Red (Profile Pic ng Team Red Rock sa Signal)
Saan binaril si Jose Rizal? (Lumang Pangalan ng lugar)
Bagumbayan
If you download a 4 GB file at 8 Mbps, approximately how long will it take? (In minutes)
68 minutes