Which of the following is a real threat actor name:
Evil Doers Society (E.D.S.)
The Caffeinated Coders
Anonymous
Anonymous
Secure or Not Secure:
Ins3cureP4$$w*
Secure
Phishing emails are a common example of social engineering, but it can take many forms. What is the most common tactic attackers use to manipulate victims into giving up personal information or taking a desired action?
Creating a sense of urgency, trust, or fear
I trick you into clicking a malicious link or opening an attachment that infects your device with malware. What am I?
Phishing attack
How was the Optus Breach achieved?
Malware
Exposed API
Social Engineering
Exposed API
Which of the following is a real threat actor name:
Cozy bear
Binary Bandits
The Bug Zappers
Cozy bear
A Russian hacking organisation. The group has the advanced capabilities to launch highly targeted attacks like SolarWinds supply-chain attacks
Secure or Not Secure:
Phronesis2024
Not secure
What is the name of a phishing attack that involved using voice calls?
Vishing
I lock up your important files and demand a payment to unlock them. What am I?
Ransomware
This cyber attack exploited a vulnerability in Microsoft Windows, causing widespread disruptions across the globe in 2017. What was the name of this ransomware attack?
WannaCry
EternalBlue
BlueKeep
WannaCry
Which of the following is a real threat actor name:
The Social Mimics
Lizard Squad
Ronin
Lizard Squad
Lizard Squad has claimed responsibility for launching a string of DDoS attacks against high-profile game-related services
Secure or Not Secure:
I don't like pineapple on pizza mate
Secure
If you see an email with a potentially suspicious link in it. How can you determine if the link directs you to a legitimate site?
I appear to be a harmless program, but I actually hide malicious code that can steal your data or remotely access your computer. What am I?
Remote Access Trojan
This series of cyber attacks, named after a famous board game, targeted critical infrastructure in Iran, including a nuclear facility. What was the name of this cyber attack campaign?
Monopoly Maneuvers
Chess Checkmate
Stuxnet
Stuxnet