Hacking Techniques
Types of Malware
Social Engineering
Cybersecurity Tools
Cybersecurity Basics
100

This type of attack floods a system with traffic to make it unavailable to users.

What is a DDoS (Distributed Denial of Service) attack?

100

This self-replicating program spreads without user interaction.

What is a worm?

100

This technique involves pretending to be someone trustworthy to gain information.

What is impersonation?

100

This software scans for and removes malicious programs.

What is antivirus software?

100

This is the practice of keeping computers and networks safe from attacks.

What is cybersecurity?

200

A hacker who exploits vulnerabilities for malicious purposes is known by this color-coded term.

What is a black hat hacker?

200

Malware that locks files and demands payment is known as this.

What is ransomware?

200

A scam email asking for login credentials is an example of this.

What is phishing?

200

A secure network tunnel often used by remote workers is called this.

What is a VPN (Virtual Private Network)?

200

A secret word or phrase used to access accounts or devices.

What is a password?

300

This technique involves intercepting communication between two parties to steal data.

What is a man-in-the-middle attack?

300

This type of malware disguises itself as a harmless program.

What is a Trojan horse?

300

This method involves manipulating someone over the phone to reveal sensitive data.

What is vishing (voice phishing)?

300

This tool stores complex passwords securely.

What is a password manager?

300

This is a common way to protect your online accounts—often used with a password.

What is two-factor authentication (2FA)?

400

This type of attack tricks a user into executing malicious code by disguising it as legitimate.

What is a phishing attack?

400

A program that secretly records keystrokes is called this.

What is a keylogger?

400

Tricking someone into clicking a malicious link on social media is called this.

What is baiting?

400

This protocol encrypts web traffic to protect user data.

What is HTTPS (Hypertext Transfer Protocol Secure)?

400

This type of file attachment should be avoided if it comes from an unknown sender.

What is a suspicious or unknown file?

500

This hacking method involves guessing passwords using dictionaries or random combinations.

What is a brute-force attack?

500

This malware gives attackers remote control over a victim’s system.

What is a RAT (Remote Access Trojan)?

500

This term describes exploiting human psychology rather than technical vulnerabilities.

What is social engineering?

500

This type of firewall monitors and filters incoming and outgoing traffic.

What is a network firewall?

500

This is the act of updating software to fix security problems.

What is patching or installing updates?

M
e
n
u