What year was the first computer virus created?
1983
What is the term for a security measure that involves verifying the identity of a user or device before granting access to a system?
Authentication
What type of attack involves an attacker intercepting and altering communication between two parties without their knowledge?
MITM attack (man in the middle attack)
Who was the hacker known for his involvement in a series of 1980s attacks, but later became a security consultant?
Kevin Mitnick
What is the practice of regularly updating software to protect against vulnerabilities called?
Patching
Who is known as the "father of computer security?"
Robert Morris
What is a vulnerability in software that is unknown to the vendor and has no patch available called?
Zero-day exploit
What is the name of the attack where an attacker sends a large number of requests to a server to exhaust its resources, but does so from multiple compromised systems?
DDoS attack (distributed denial of service)
What hacker group is known for its cyber attacks on government and corporate websites, often for political reasons?
Anonymous
What is the term for using two different forms of identification to access an account?
2FA (two-factor authentication) or MFA (multi-factor authentication)
What was the name of the first worm to spread on the internet?
The Morris Worm
What is the term for a type of malware that disguises itself as legitimate software but performs malicious activities once installed?
Trojan Horse
What is the term for an attack that exploits a vulnerability in a web application by injecting malicious scripts into content from otherwise trusted websites?
XSS (cross-site scripting)
Who was the British hacker that infiltrated NASA and the US military systems in 2002?
Gary McKinnon
What is the principle of giving users the minimum levels of access/permissions needed to perform their job functions?
Principle of Least Privilege
When was the term "cybersecurity" added to the dictionary?
1989
What is the term for a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
Firewall
What type of attack involves an attacker gaining unauthorized access to a system by exploiting a vulnerability in the system's software or hardware?
Exploit attack
What hacker was responsible for the creation of the MyDoom virus, one of the fastest-spreading email worms?
The identity of the MyDoom creator remains unknown.
What is the process of converting data into code to prevent unauthorized access called?
Encryption
What was the name of the operation that led to the arrest of the hacker group LulzSec?
Operation AntiSec
What does "SOC" stand for, and what is its role in an organization?
Security Operations Center; it is responsible for monitoring and analyzing an organization' security posture on an ongoing basis.
What is the name of the sophisticated attack that involves an attacker gaining access to a network and remaining undetected for an extended period to steal data?
APT (advanced persistent threat)
Who was the hacker known as "Mafiaboy" who launched a series of high-profile DDoS attacks in 2000?
Michael Calce
What is the term for a security measure that involves monitoring and analyzing network traffic for signs of potential threats?