Devices that connect to a network system such as mobile devices, desktop computers, virtual machines, embedded devices, and servers.
What is an Endpoint?
CISSP
What is Certified Information Security Systems Professional?
The location of the 1st store, T1
Where is Roseville?
The decimal value of 1110
What is 14?
A young hacker accidentally accesses a military supercomputer and almost starts World War III
What is War Games?
A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents.
What is Antivirus software?
CVE
What is Common Vulnerabilities and Exposure?
The year the first store opened
When was 1962?
The next number in the pattern 0 1 1 2 3 5 8 13 21 34
What is 55?
A hacker discovers the reality he lives in is a simulated reality created by sentient machines
What is the Matrix?
He is often referred to as the "father of computer security"
Who is John McAfee?
REST
What is representational state transfer?
It was the name of the first alternate format store
What is Target Greatland?
What the following Python expression will return?
pow(2, 3)
or
2 ** 3
What is 8?
A hacker helps a journalist investigate the Vangers family's dark secrets
What is The Girl with the Dragon Tattoo?
A type of cyber attack using data from cryptocurrency wallets and messaging apps such as Telegram, Steam, and Discord to gather information and steal cryptocurrency.
What is Crypto-Siphoning?
PEBKAC
What is problem exists between keyboard and chair?
It's what DHC stands for
What is Dayton–Hudson Corporation?
What the following Python code will print to the console?
result = 0
for i in range(5):
result += i
print(result)
What is 10?
Follows a cybersecurity engineer by day and vigilante hacker by night as he tries to take down Evil Corp
What is Mr. Robot?
These are the 3 main types of malware.
What are viruses, trojans and worms?
XSS
What is Cross Site Scripting?
The answer to life the universe and everything
What is 42?
A programmer must navigate a virtual landscape and team up with a heroic security program to escape and defeat the villainous Master Control Program
What is Tron?