TOPIC
|
QUESTION |
| Hardware |
There was a vulnerability where a Firewire device, when plugged in, can overwrite anywhere in memory. What hardware protocol caused this? |
DMA or Direct Memory Access |
| Digital Forensics |
What is the hiding of a secret message within an ordinary message and the extraction of it at its destination called? |
Steganography |
| History, Personality & Literature |
What was the name of the 1983 movie where Mathew Broderick played a young hacker who gained access to a government nuclear war simulator? |
Wargames |
| System/Network Admin |
In Microsoft Internet Explorer, which file stores information about a user’s browsing history such as URLs? |
the index.dat file |
| Cryptography |
In practical cryptography, what is the name of the functions that are embodied in a physical structure, that is easy to evaluate but hard to characterize. |
PUF or Physical Unclonable Function |