This is the main triad focus of cybersecurity.
What is Confidentiality, Integrity, Availability?
If I hold your system hostage for money, it is -
What is ransomware?
Don't say password! This is the more appropriate term for one.
What is passphrase?
This is an example of a type of authentication which is something you are. (Something you know, something you have, something you are)
What is a fingerprint?
Explain the difference between virus and worm.
-
Unauthorized modification of data falls under which part of the triad?
What is Integrity?
This type of attack is when two password hashes end up having the exact same value.
What is a Birthday Attack?
Oftentimes, a collection of data, such as a hashed password is stored in this.
What is a database?
Fingerprint, Retina scan, Voice, and Face ID are all examples of this type of authentication.
What is Biometrics?
This is like spyware, but through pop ups on your computer on a website or window.
What is adware?
Prevention + (Detection + Response) = ?
What is Protection?
This type of attack automates the process of rapidly testing many potential passwords for a given account using a list of words.
What is a Dictionary attack?
What exactly is a hash?
What is a special mathematical function that performs one-way conversion?
This is what AAA stands for.
What is Authentication, Access Control, and Accounting?
A programmer might install a what on a system, timing it to go off long after they have left the company.
This state of data is when information is stored in files, databases, or hard drives.
What is Data at Rest?
This is the inverse of a Brute Force attack.
What is Password Spraying?
Your windows machine typically holds all account details such as usernames and passwords in this.
What is a SAM Registry Hive?
This is what you call the little lock next to a website url.
What is a certificate?
This is a group of programs installed by an attacker to gain complete control of a computer.
What is a rootkit?
This man leaked confidential information from the CIA and NSA, and became a Russian Citizen in 2022.
Who is Edward Snowden?
What is Pakistan?
List a commonly used hashing algorithm.
What are MD5, SHA256, or SHA512?
This length of characters on the chart could take up to 7 quadrillion years to crack with a brute force attack.
What is 18?
A software is released, and attacker finds a vulnerability immediately.
What is a zero day?