STRIDE
Good Security
Hacking
Vulnerability Management
Random
100

Define Spoofing, Give an Example

Pretending to be something/someone you are not.

Ex: Pretending to be a security guard to get into a bank.


100

Is throwing non confidential material in the bin ok?

Yes

100

What is Google Dorking

Google Hacking


100

What does Vulnerability Management mean?

Finding and fixing system weakness

100

How old is Cindy? 

She doesn't look a day over 20!

200

True or False,

Finding someone's key to get into the building is an example of tampering.

False

200

Is letting a close coworker piggyback ok?

No

200

What does a green light on your camera on without you accessing it mean?

It means you got hacked boiiiiiiiiiiiiiiii

200

How long should it take to patch critical vulnerabilities?

Less than 30 days
200

Name Cindy's dogs

Tyson & Daisy 

300

Is using a keycard a form of repudiation or non repudiation?

Non Repudiation

300

Is it ok to take company info home?

Not without authorization

300

What do you use to find illegal MP3's online? (ex. Beyoncé)

intitle: index pf MP3 intitle: Beyonce

300

What are the five steps of Vulnerability Management? 

Scope

Prioritize

Scan

Remediate

Test

300

What are the three rotations the GirlsGetIT take part in?

DevOps

HIVE/DSC

IT Security/ITI

400

If you click on a link and the web page doesn't pop up you are most likely getting hacked through which part of S.T.R.I.D.E.

Denial of Service 

400

Sally took a selfie in her office, she posted it on social media, but there was confidential information and she didn't notice, should she take down the post?

Yes

400

Give an example of a Google Dorking tag

intitle:

filetype:
400
What does MBFS use to scan tests for vulnerabilities?

Qualys

400

How many Kevins are on both the buildings? (only the ones we met)

4

500

Name all the terms 

S-Spoofing

T-Tampering

R-Repudiation

I-Information Disclosure 

D-Denial of Service

E-Elevation of Privilege


500

What is required for a strong password?

More than 8 characters

Capitalize

Lower case 

Special number/character

500

What operating system is most commonly used for hacking?

Linux 

500

What are the four levels of information classification?

Secret

Confidential

Internal

Public

500

Who runs the GirlsGetIT Program?

Afia, Cindy, and Sara