Information Assurance
Attacks
Malware
Hackers
Data
100

The CIA Triad

What is confidentiality, integrity, and availability?

100

A point at which there is potential for a security breach

What is a vulnerability?

100

Malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action

What is ransomware

100

An unsophisticated person who attacks using off-the shelf tools

What is a script kiddie?

100

A one-way transformation of data into a fixed-length value.

What is hashing?

200

Ensuring that users cannot deny knowledge of sending a message or performing some online activity at some point later in time.

What is non repuditation?

200

Some danger that can exploit a vulnerability

What is a threat?

200

Records the activities of the user, such as the passwords they type into the computer and transmits this information to the person who wrote the malware

What is spyware (or What is a key logger)?

200

A group of hackers funded directly or indirectly by a government.

What are state-sponsored hackers?

200

A reversible (2-way) transformation between content and ciphertext.

What is encryption/decryption?

300

Identify, Protect, Detect, Respond, Recover

What are the core functions of the NIST Cybersecurity Framework (v1.x)?

300

Someone who commits crimes over the internet

What is a cybercriminal?

300

These are created using malware that allows an attacker to control a group of computers and use them for cyber crimes.

What are botnets?

300

A person who is employed to find vulnerabilities before anyone exploits them so that the organization can protect against them.

What is a white-hat hacker?

300

A value sent alongside content which allows the receiver to test the integrity of the content

What is a checksum?

400

Verifying the identity of a user

What is authentication?

400

Emails that are fake and asking you to click on a link to give you malware

What is phishing?

400

Malware that can spread by itself

What is a worm?

400

A person who hacks in order to pursue an agenda or raise awareness of a topic.

What is a hacktivist?

400

A value stored alongside password hashes to increase security

What is a salt?

500

18

What is the number of CIS controls?

500

Action you take to protect your information against threats and vulnerabilities.

What is a countermeasure?

500

A polymorphic virus

What is a kind of virus that changes itself in order to evade detection?

500

A person who hacks to find vulnerabilities without permission but discloses information to organizations and is sometimes paid a bounty.

What is a grey-hat hacker?

500

Precomputed lists of hashes for common passwords

What is a rainbow table?

M
e
n
u