Types of Testing
Types of Attacks
Cyber Jobs
Cyber Security Companies
Cyber Terms
100

Tests/exploits a computer to find any vulnerabilities.

What is Penetration Testing?

100

Invades and overwhelms the website to the point of where it isn't usable.

What is DDoS Attacks?

100

Protect military networks and the country from cyber attacks.

What is Cyber Security Officer?

100

Massively distributed edge and cloud platform that keeps experiences closer to users.

What are Akamai Technologies?

100

Requires further authentication to prove you are who you say you are.

What is Firewall?

200

Figures out how an application works and then attempts to break into it.

What is White Box Testing?

200

Renders the user completely unable to do anything until they are paid.

What is Ransomware?

200

Identify threats and vulnerabilities in a system

What is Cybersecurity Engineer?

200

Their purpose is to power an inclusive future for all through software, networking, and security

What are Cisco Systems

200

Virus of some sort.

What is Malware?

300

Evaluates the security of a device.

What is Black Box Testing?

300

Replicate on a server and go from computer to computer that plants a virus and creates more in every single device.

What is a Worm?

300

Evaluates the system for vulnerabilities.

What is Information Security Architect?

300

Unparalleled assurance in a common cloud, end-to-end across the entire network.

What are Juniper Networks?

300

Acts like one thing, but when you click it it takes control or your device instead of giving promised gifts.

What is Trojan Horse?

400

When you move from device to device from the cloud.

What is Cloud Data Testing?

400

The hacker attempts to brute force guess a password until they get something.

What is a Password Attack?

400

Works with a team to cover the cyber security needs of an organization.

What is a Cyber Security Administrator?

400

Security solutions, threat intelligence, infrastructure, and application delivery.

What are A10 Networks?

400

Makes your Computer special, how to identify your computer.

What is IP Address?

500

Defines overall security of your computer.

What is Posture Testing?

500

Intercepts data between two people or applications.

What are MITM Attacks?

500

Examines technology systems.

What is Technology Audit?

500

Auto backup software and business solutions help protect your personal and business data from common forms of data loss?

What is Carbonite?
500

Makes something like a video look like something or someone else.

What is Deepfake?

M
e
n
u