History
Terminology
Attacks
Famous Hackers
Best Practices
100

What year was the first computer virus created?

1983

100

What is the term for a security measure that involves verifying the identity of a user or device before granting access to a system?

Authentication 

100

What type of attack involves an attacker intercepting and altering communication between two parties without their knowledge?

MITM attack (man in the middle attack)

100

Who was the hacker known for his involvement in a series of 1980s attacks, but later became a security consultant?

Kevin Mitnick

100

What is the practice of regularly updating software to protect against vulnerabilities called? 

Patching

200

Who is known as the "father of computer security?"

Robert Morris

200

What is a vulnerability in software that is unknown to the vendor and has no patch available called?

Zero-day exploit

200

What is the name of the attack where an attacker sends a large number of requests to a server to exhaust its resources, but does so from multiple compromised systems?

DDoS attack (distributed denial of service)

200

What hacker group is known for its cyber attacks on government and corporate websites, often for political reasons?

Anonymous

200

What is the term for using two different forms of identification to access an account?

2FA (two-factor authentication) or MFA (multi-factor authentication)

300

What was the name of the first worm to spread on the internet?

The Morris Worm

300

What is the term for a type of malware that disguises itself as legitimate software but performs malicious activities once installed?

Trojan Horse

300

What is the term for an attack that exploits a vulnerability in a web application by injecting malicious scripts into content from otherwise trusted websites?

XSS (cross-site scripting) 

300

Who was the British hacker that infiltrated NASA and the US military systems in 2002?

Gary McKinnon

300

What is the principle of giving users the minimum levels of access/permissions needed to perform their job functions?

Principle of Least Privilege 

400

When was the term "cybersecurity" added to the dictionary? 

1989

400

What is the term for a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules?

Firewall

400

What type of attack involves an attacker gaining unauthorized access to a system by exploiting a vulnerability in the system's software or hardware?

Exploit attack

400

What hacker was responsible for the creation of the MyDoom virus, one of the fastest-spreading email worms?

The identity of the MyDoom creator remains unknown. 

400

What is the process of converting data into code to prevent unauthorized access called?

Encryption 

500

What was the name of the operation that led to the arrest of the hacker group LulzSec?

Operation AntiSec

500

What does "SOC" stand for, and what is its role in an organization? 

Security Operations Center; it is responsible for monitoring and analyzing an organization' security posture on an ongoing basis. 

500

What is the name of the sophisticated attack that involves an attacker gaining access to a network and remaining undetected for an extended period to steal data?

APT (advanced persistent threat) 

500

Who was the hacker known as "Mafiaboy" who launched a series of high-profile DDoS attacks in 2000?

Michael Calce

500

What is the term for a security measure that involves monitoring and analyzing network traffic for signs of potential threats?

IDS (intrusion detection system) 
M
e
n
u