Fundamentals
Common Threats and Attacks
Networking Basics
Famous Hacks and Breaches
Cyber Hygiene and Best Practices
100

Confidentiality, Integrity, Availability

What does "CIA" stand for in cybersecurity?

100

A type of attack where a malicious actor tries to trick someone into revealing sensitive information by pretending to be a trusted entity.

What is phishing?

100

Internet Protocol

What does IP stand for in "IP address"?

100

In 2013, this major retailer experienced a breach that exposed 40 million credit and debit card numbers

What is Target?

100

The practice of using a second method of authentication, in addition to a password, to protect an account

What is Two-factor authentication (2FA)?

200

To protect information by converting it into a coded format that can only be read by someone with the decryption key

What is encryption?

200

Type of attack involves overwhelming a network or server with traffic to make it unavailable to users?

What is Distributed Denial-of-Service (DDoS) attack?

200

A device that forwards data between computer networks, ensuring data gets to its destination?

What is a router

200

In 2017, this credit reporting agency suffered a data breach that exposed the personal information of 147 million people

What is Equifax?

200

Software that scans your device for viruses and other malicious software

What is Antivirus software?

300

Monitors and controls incoming and outgoing network traffic based on predetermined security rules to prevent unauthorized access

What is a firewall? 

300

A type of malware that encrypts a victim's data, holding it hostage until a ransom is paid to unlock it  

What is ransomware?

300

Name of the protocol used to securely transfer files over the internet, often used instead of FTP

What is SFTP (Secure File Transfer Protocol) ?

300

Targeted in the 2014 cyberattack linked to North Korea after the release of a controversial movie

Sony Pictures

300

A security practice where users and systems are given the minimum level of access needed to perform their tasks, reducing the risk of misuse or breaches

What is the principle of least privilege?

400

Requires two or more methods of verification for access, while two-factor authentication (2FA) specifically uses exactly two methods

What is multi-factor authentication (MFA), and how does it differ from two-factor authentication (2FA)?

400

Software security flaw that is unknown to the software vendor and has no patch available, making it vulnerable to exploitation

What is a zero-day vulnerability?

400

A 32-bit number that divides an IP address into network and host portions, helping to define the range of IP addresses within a network

What is a subnet mask?

400

2016 cyberattack targeted the Democratic National Committee (DNC) and had significant political consequences

Which 2016 cyberattack targeted the Democratic National Committee (DNC) and had significant political consequences?

400

Involves regularly updating software and systems with security patches to fix vulnerabilities and protect against cyber threats

What is patch management?

500

Uses the same key for both encryption and decryption, while _____ encryption uses a pair of keys—a public key for encryption and a private key for decryption.

What is the difference between symmetric and asymmetric encryption?

500

Prolonged and targeted cyberattack where a malicious actor gains unauthorized access to a network and remains undetected for an extended period to steal data or cause disruption.

What is an Advanced Persistent Threat (APT)?

500

It is a protocol used to encrypt the communication between a web server and a browser, ensuring secure data transmission

What is SSL?

500

2014 breach affected 500 million user accounts and led to the sale of the affected company to Verizon in 2017

What is the The Yahoo data breach ?

500

A documented strategy used by an organization to detect, respond to, and recover from cybersecurity incidents in order to minimize damage and restore normal operations as quickly as possible

What is a security incident response plan?

M
e
n
u