Which popular Q&A platform for programmers revealed last Thursday that someone gained access to its production systems?
Stack Overflow
RFC
Request for Comment
a formal document from the Internet Engineering Task Force ( IETF ) that is the result of committee drafting and subsequent review by interested parties. The final version of the RFC becomes the standard.
What country are the following APT groups associated with?
APT33, APT34, APT35, APT39
Iran
A computer user mostly interacts with ___ layer?
the application layer
Which great house has this banner
House Lannister
Which internet-related registry discovered a fraud scheme in late-2018 through which 757,760 IPv4 addresses worth between $9,850,880 and $14,397,440 were fraudulently obtained?
The American Registry for Internet Numbers (ARIN)
TLS
Transport Layer Security
a protocol that provides authentication, privacy, and data integrity between two communicating computer applications. Widely implemented in browsers and Web servers.
This group reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election.
APT28/Sofacy/Tsar Team/Fancy Bear
What does the data link layer use to route frames?
MAC addresses
What is the name of this Valyrian Steel Sword?
Longclaw
What company confirmed this week that it was hacked in 2016 but the company decided not to make the breach public as it found no evidence that it affected users.
TeamViewer
RADIUS
Remote Authentication Dial-In User Service
a networking protocol, that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.
This APT group was reportedly responsible for the November 2014 destructive wiper attack against Sony Pictures Entertainment.
Lazarus Group/Hidden Cobra/Guardians of Peace
Data is grouped into frames in the ___ layer.
the data link layer
What is the high Valyrian word for "dragon fire"?
Dracarys
Ten members of this cybercriminal group, which used a hybrid of Nymaim and Gozi malware to collect banking credentials from more than 40,000 victims and steal roughly $100 million USD, were indicted for computer fraud conspiracy, wire and bank fraud conspiracy, and money laundering.
the GozNym cybercriminal group
RSA
The Rivest-Shammir-Adleman algorithm
is now the most widely used asymmetric cryptosystem on the web today
This group is renowned for its attempt to steal hundreds of millions of dollars from financial institutions through the brazen use of destructive malware.
APT38/Stardust Chollima
On what layer does data compression and encryption occur?
the presentation layer
Which great house has the motto "Growing Strong", fitting of their house sigil?
House Tyrell
Tenable this week announced an expanded version of its free vulnerability assessment solution previously known as Nessus Home. What is it called?
Nessus Essentials
NVD
National Vulnerability Database
The U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP).
The group is known to target MSP in order to get access to the customer data.
APT10/MenuPass
The session layer responds to service requests from the ___ layer and issues service requests to the ___ layer.
presentation, transport
What is the name of the Valyrian steel sword that originally belonged to house Tarly but was then gifted to Ser Jorah?
Heartsbane