Malicious Software
Zero
More Zero
Hero
100

Which type of attack exploits a vulnerability that is not yet known to the vendor?

What is a zero-day exploit?

100

Famous cola with zero sugar added

What is Coke Zero?

100

Canada considered banning this device, as it claimed it is used for car theft

Flipper Zero

100

Forensic Took Kit (FTK)

What is the standard tool used by computer forensic experts?

200

A program that offers monetary rewards to ethical hackers for successfully discovering and reporting a vulnerability or bug to the application's developer

What is a Bug/Security Bounty Program

200

Another word for Zero Day

O "OH" Day

200

Another word for the index case of the first documented patient in a disease epidemic within a population 

Patient Zero

200

The process of reverse-engineering malware to understand its functionality

What is malware analysis?

300

What is the process of disguising malicious software as legitimate software?

What is obfuscation?

300

Refers to an exploit that requires no user interaction to successfully gain access or execution

Zero Click

300

Where was the concept of zero developed as a written digit in the decimal place value notation?

 India

300

The process of applying updates to software, drivers, and firmware to protect against vulnerabilities.

What is patch management?