Malware
Social Attacks
Sysmon
Security Appliances
Windows OS
100

A piece of code that spreads from one computer to another by attaching itself to other files.

What is a Virus?

100

This is an the type of attack the Hak.5 rubber ducky uses to bypass USB filters.

What is keystroke injection?

100

This the sysmon ID for network connection

What is 3?

100

A network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.

What is a firewall?

100

This is the colloquial term for the date each month that Microsoft releases patches and updates for its operating systems.

What is patch Tuesday?

200

A piece of code that spreads from computer to computer on its own, without user interaction.

What is a Worm?

200

The most common type of email-based social engineering attack, in which the attacker seems to be a reputable source in attempts to extract personal information.

What is Phishing

200

The sysmon ID 1 signifies this type of event

What is process creation?

200

This is a server application or appliance that acts as an intermediary between a client requesting a resource and the server providing that resource.

What is a web proxy?

200

The file system that the Windows NT operating system uses for storing and retrieving files on a hard disk.


New Technology File System (NTFS)

300

An type of malware that poses as a normal, helpful file or software and tricks the victim to run it.

What is a Trojan?

300

This is a form of phishing that targets executive members of a company such as the C-suite and board of directors.

What is Whaling?

300

This is the index that sysmon logs are currently stored in our SIEM.

What is WinLogBeats?

300

Acunetix, Nexpose, Nessus, Qualys and Saint are all examples of this type of this type of security appliance.

What is a vulnerability scanner?

300

This is a task automation and configuration management program from Microsoft, consisting of a command-line shell and the associated scripting language which has essentially replaced the windows command prompt for most tasks.

What is powershell?

400

Surreptitiously installed malicious software that is intended to track and report the usage of a target system, or to collect other data the author wishes to obtain.

What is Spyware?

400

An social engineering attack where an unauthorized person follows an authorized individual to enter secured premises. 

What is tailgating?


Will also accept piggybacking

400

This is the sysmon event ID for errors

What is 255?

400

These are security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed.

What is a Cloud Access Security Broker or CASB?

400

A full disk encryption feature included with Microsoft Windows versions starting with Windows Vista.

BitLocker

500

Petya, WannaCry, Locky, and Ryuk are all examples of this type of malware.

What is Ransomware?

500

In this type of social engineering attack, the attacker poses as an attractive individual and pretends to be romantically interested in the victim in an attempt to get access or information from them.

What is a honey trap?

500

These were the two individuals that tested and installed sysmon in our environment.

Who are Mohammed O and Malak?

500

This is a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk. 

What is NAC?

500

This is the first version of Windows to require a TPM chip before installation can occur. 

What is Windows 11?