Attacks
Networking
Cryptography
Malware & Threats
General Knowledge
100

This attack uses a fake email that tries to steal your info.

What is a phishing attack?

100

This device connects networks together (not a switch).

What is a router?

100

A method or algorithm used to encrypt and decrypt information.

What is a cipher?

100

This type of malware is known for self-replicating across systems.

What is a worm?

100

What does "URL" stand for?

What is "Uniform Resource Locator"?

200

This attack occurs when an attacker guesses many passwords until one works.

What is a brute force attack?

200

This protocol is used to securely browse websites.

What is HTTPS?

200

This encryption method uses the same key is used to encrypt and decrypt.

What is symmetric encryption?

200

This type of malware is hidden inside hardware or firmware.

What is a rootkit?

200

This term refers to how long a system or service has been running without interruption.

What is uptime?

300

This attack uses malicious code hidden inside a normal-looking file.

What is a Trojan?

300

What does DNS do?

What is "translates domain names into IP adresses" (or similar)?

300

This widely used hashing algorithm outputs 256-bit hashes.

What is SHA-256?

300

This type of malware secretly mines cryptocurrency on a victim's machine.

What is a cryptojacker?

300

This symbol in a browser's address bar indicates a secure connection.

What is a padlock icon? (or similar)

400

This type of attack can occur when a hacker secretly sits between two people communicating.

What is a man-in-the-middle (MiTM) attack?

400

This is the maximum amount of data that can be transferred per second.

What is bandwidth?

400

In cryptography, this is the original, readable data before it is encrypted.

What is plaintext?

400

This type of malware encrypts your files and demands payment.

What is ransomware?

400

This data defines and describes the characteristics of other data. 

What is metadata?

500

This attack occurs when attackers inject malicious code into a website through user input. 

What is Cross-site Scripting (XSS)?

500

This creates separate virtual networks on the same physical switch.

What is a Virtual Local Area Network (VLAN)?

500

RSA security relies on the difficulty of solving this mathematical problem.

What is factoring large prime numbers?

500

This type of malware activates when specific conditions are met (like a date or event).

What is a logic bomb?

500

This is responsible for verifying and issuing trusted digital certificates for websites.

What is a certification authority (CA)?

M
e
n
u