Network Attack Types
Malware Types
Cryptography
Threat Actors
100

What type of attack is tailgating?

Social Engineering 

100

Which malware denies access to the infected computer system and demands payment before the restriction is removed?

Ransomware

100

Which encryption method repeats an algorithm process three times and is considered very trustworthy when implemented using very short key lifetimes?

Triple DES

100

Which type of hacker is described in the scenario: My job is to identify weaknesses in my company’s network 

A. White Hat

B. Gray Hat

C. Black Hat

White Hat

200

What type of attack is a password attack?

Access

200

Which malware is non-self-replicating type of malware? It often contains malicious code that is designed to look like something else, such as a legitimate application or file.

Trojan Horse

200

Which encryption method encrypts plaintext one byte or one bit at a time?

Stream Cipher

200

Which type of hacker is described in the scenario It is my job to work with technology companies to fix a flaw with DNS.

White Hat

300

A threat actor sends an enormous quantity of data at a rate that the network, host, or application cannot handle. What type of attack is this?

Dos

300

Which malware is used to gather information about a user and then, without the user's consent, sends the information to another entity?

Spyware

300

Which encryption method uses the same key to encrypt and decrypt data?

Symmetric

300

Which type of hacker is described in the scenario: While searching for security exploits, I stumbled across a security vulnerability on a corporate network and decided to save it for future use.

Black hat

400

What type of attack is man-in-the-middle?

 Access

400

Which malware executes arbitrary code and installs copies of itself in the memory of the infected computer? 

(Hint)The main purpose of this malware is to automatically replicate from system to system across the network.

Worm

400

Which encryption method is a stream cipher and is used to secure web traffic in SSL and TLS?

Rivest Cipher

400

Which type of hacker is described in the scenario: During my research for security exploits, I stumbled across a security vulnerability on a corporate network that I am authorized to access.

White Hat


500

What type of attack is port scanning?

Reconnaissance

500

Which malware is installed on a compromised system and provides privileged access to the threat actor?

Rootkit

500

There are four well-known hash functions. 

Can you name three of the four?

MD5 with 128-bit Digest 

SHA Hashing Algorithm

SHA-2

SHA-3  

500

Which type of hacker is described in the scenario: After hacking into ATM machines remotely using a laptop, I worked with ATM manufacturers to resolve the security vulnerabilities that I discovered.

Gray hat

M
e
n
u