This term refers to the practice of tricking individuals into revealing sensitive information through deceptive emails or websites.
What is phishing?
In a DDoS attack, this term stands for?
What is Distributed Denial of Service.
This software is designed to detect and remove malicious software from a computer.
What is antivirus software?
This command is used to list the contents of a directory.
What is ls?
This term refers to a flaw or weakness in software or hardware that can be exploited by attackers.
What is a vulnerability?
Name a type of authentication method that requires something you know and something you have.
What is two-factor authentication (2FA)?
A virus and a worm are both types of this malicious software, but they have a key difference.
What is malware? Difference: A virus requires user interaction, while a worm can spread on its own.
A Security Information and Event Management (SIEM) system helps organizations collect and analyze this type of data for security purposes.
What is log and event data?
To navigate to the home directory, you can use this command.
What is cd?
A "zero-day vulnerability" is called "zero-day" because of this characteristic.
What is it being exploited on the same day it's discovered?
This is a broad category of software that includes viruses, spyware, and ransomware. Give an example.
What is malware? Example: WannaCry.
In this type of attack, hackers encrypt a victim's files and demand a ransom for their decryption.
What is ransomware?
This practice involves simulating cyberattacks to identify vulnerabilities in a system.
What is penetration testing?
This command allows you to create a new directory.
What is mkdir?
In a "buffer overflow" vulnerability, an attacker can exploit excessive data input to do this to a system.
What is execute malicious code or crash the system?
This protective barrier filters network traffic and helps prevent unauthorized access to a network.
What is a firewall?
This type of attack relies on manipulating individuals into revealing confidential information or performing actions that compromise security.
What is social engineering?
This process involves converting data into a code to prevent unauthorized access, ensuring confidentiality.
What is encryption?
To copy files or directories, you can use this command followed by the source and destination paths.
What is cp?
"SQL injection" is an attack that targets this type of database security vulnerability.
What is improperly sanitized user input?
This technology is used to create a secure and private connection over a public network, such as the internet.
What is a Virtual Private Network (VPN)?
Name one method to protect against phishing attacks.
What is user education and awareness, email filtering, or using an anti-phishing tool?
Name two popular open-source cybersecurity tools.
What are Wireshark and Snort?
This command is used to search for text within files.
What is grep?
To prevent vulnerabilities, it's crucial to keep software and systems updated with these.
What are patches and security updates?