This tool allows users to "sniff" packets and observe all messages that pass through a computer network.
What is Wireshark?
The hexadecimal encoding of the decimal number 13
What is 0xd?
This man was a whistleblower who leaked NSA confidential information about surveillance programs that violated individual privacy rights.
Who is Edward Snowden?
This tool allows IT/Network administrators to block certain types of network traffic that could present security issues.
What is a firewall?
This human behavior increases the risk of stolen credentials, potentially leaving other accounts and services of that user vulnerable.
What is password reuse?
When computers connect to a network, they are given this type of address
What is an IP Address?
Passwords are stored using this to hide the plain text
What is a hash?
This security feature was the focus of the FBI vs. Apple court case to gain access to a criminal's iPhone to search for incriminating messages or data.
What is a passcode?
These files record information about what events have happened and can be used by IT to trace history and impact of an attack
What are server logs?
This property is the most significant factor in making a password take an unreasonably long time to brute force.
What is password length?
These addresses are unique to each physical computer device - all connected devices (computers, printers, phones, servers, routers, etc.) have one of these.
What is a MAC address?
The result of 1011001 XOR 1101011
What is 0110010?
This EU regulation provides people with rights and controls for how their personal information is used, processed, and shared by websites
What is GDPR?
These can be stolen by hackers to hijack login sessions to impersonate other users without ever having to steal or crack passwords
What are cookies?
You should make sure websites are using this secure protocol before typing login credentials into the fields.
What is HTTPS?
This is the protocol used by the command that regularly pings another computer to check that the connection remains and measure its latency
What is ICMP?
The result of 313 mod 5
What is 3?
This type of information is regulated and required to be stored securely using encryption, and allow users to request a company delete it under the GDPR.
What is personally identifiable information?
Hackers might send these types of emails to Bass Pro Shops or other companies to try to trick employees into entering confidential information
What is a phishing attack?
These tools require physical checks before being granted access to a system
What are biometrics?
Network administrators might use this strategy to contain a computer virus and keep it from spreading to other connected machines.
What is network isolation?
This historical encryption technique has been used for millennia, but does not provide great security
What is the Caesar Cipher?
What are Terms & Conditions?
This career legally exploits software and computer networks to look for vulnerabilities and assess the security of systems so that we can better protect against attacks.
What is a penetration tester?
What are SSL Certificates?