HACKER MOVIES
HACKER TOOLS
CYBER SECURITY POLICY
CYBERSECURITY @HOME
MYSTERY
100

What 1995 movie involves a group of teenage hackers who must prove a sinister superhacker is framing them for a plot to embezzle funds from a large oil company.

Hackers

100
First released in 1998, Ethereal is the predecessor to what widely used, free and open source network protocol analyzer?
Wireshark
100
What does the Security Control Family abbreviation ‘IA’ stand for?
Identification and Authentication
100

The basic elements of a strong password recommended by expert includes a combination of upper case and lowercase letters, numbers, and __________.

Symbols/Special Characters

100
A system administrator may have a user level account and an administrator account to prevent what?
Escalation of privileges
200

What movie was shown in Congress by Representative Dan Glickman, as part of his presentation of a 1983 anti-hacking bill that would lead to the creation of the Computer Fraud and Abuse Act of 1984?

WarGames

200
What method uses programs to automatically generate and inject random or known-dangerous values into a program to look for vulnerabilities?
Fuzzing
200
What role is responsible for implementing the security controls during Risk Management Framework (RMF) Step 3?
Information System Security Engineer (ISSE)
200

Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This attack is called __________.

Ransomware

200
A programmer allocates 16 bytes for a string variable, but does not adequately ensure that more than 16 bytes cannot be copied into the variable. This program may be vulnerable to what type of attack?
Buffer Overflow
300

What 1995 movie is about a computer expert who discovered secret information on a disk she received from a friend that leads to her records being erased and receiving a new identity?

The Net

300

What popular hacker tool can now be used to conduct security assessments on hardware, such as the Controller Area Network (CAN) bus in modern cars, IoT devices, and industrial control systems, thanks to a new Hardware Bridge API?

Metasploit

300
What plan assists the organizational staff in preparing, managing, responding to, and recovering from a catastrophic failure or emergency?
Contingency Plan
300
What type of attack attempts to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with?
Phishing Attack
300
What is the most secure method of access, authentication, and authorization by default?
Kerberos
400

What movie centers around a high-tech villain who is the leader of a covert counter-terrorist unit, Black Cell, and a super hacker convicted by the FBI but who is trying to stay clean?

Swordfish

400
What device is part router, part fruit, and comes preloaded with many wireless hacking tools out of the box?
WIFI Pineapple
400

Provides standardized policies for cybersecurity and information assurance, procedures, and implementation guidance for use in the management of systems at all classification levels under the purview of the SAP Authorizing Official (AO).

Joint SAP Implementation Guide

400
What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?
That information entered into the site is encrypted
400
What technique would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a network?
ARP Poisoning
1000

What language was created by hackers to communicate covertly on websites, newsgroups, etc. (i.e. 1 4m 3l1t3)

l33t speak

Click to zoom
M
e
n
u