What type of color palette would be used for a snowy, winter photo
Cool
Colors that cannot be created or made
Primary colors
A program that attaches to a host file
Confidentiality, Integrity and Availability
Social Engineering is used to manipulate humans using what?
Technology
Name the most used colors in a warm color palette
Red, Orange and Yellow
Colors that can be created by mixing primary colors
Secondary Colors
A program that reproduces without needing a host
Worm
What part of the triad is this example a breech of?
Alice and Bob play computer games. Right as Alice is about to slay Bob’s character with a +10 spell, Bob yanks her Ethernet cable.
Availability
Phishing emails are bogus emails used to trick you into supplying ________________ and _________________ information.
Confidential & Personal
Name the most used colors in a Cool color palette
Blue, Green, Purple
Colors that can be made by mixing primary and secondary colors
Tertiary colors
Presents as a game or a song
Trojan
What part of the triad is this example a breech of?
Bob sends Alice a check for $10. She then adds a “0” to the amount so now Bob has sent Alice a check for $100.
Integrity
When hackers are guessing your passwords they KNOW women are usually using what as part of it?
Personal names
What type of color palette would be used in a sunset photo?
Warm
What type of color is orange-yellow?
Tertiary
Usually delivered through a trojan horse
Backdoor
What part of the triad is this example a breech of?
Bob and Alice are in the same class at school. When the teacher passes back the tests, he announces what each student received on the exam.
Confidentiality
For online tools to qualify as OSINT they need to be what?
Free, public and accessed legally
Colors are used to help promote what?
Emotions
Name a secondary color
Green, purple or orange
A series of computers that are being controlled by one Botmaster from backdoor malware
Botnet
What part of the triad is this example a breech of?
Bob is trying to buy concert tickets to a concert that sells out in under 5 minutes. When ticket sales open, a million people attempt to purchase tickets and the system crashes. Unfortunately, Bob is now unable to buy the concert tickets.
Availability
What three things make social engineering successful?
Humans want to be helpful, humans want to avoid confrontation, and humans make sloppy mistakes