Protection
Attacks
General Security Information
General IT
Names
100

As cybersecurity threats grow, many websites have evolved to include this increased security feature that requires a separate means of authenticating yourself.

What is Multifactor Authentication (MFA)?

100

A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack, which is by far the most common cyberattack on the internet.

What is phishing?

100

A password that is limited strictly to numeric characters.

What is a Personal Identification Number?

100

Stored digital data is said to be “at ____" if it’s inactive.

What is rest?

100

If a friendly horse offers you something online that turns out to be malware, that's a cyberattack named for a siege on this ancient city.


What is Troy?

200

The process of converting plaintext into another format that cannot be decoded without a key.


What is encryption?

200

A common method for attackers to guess passwords by trying many combinations quickly.

What is a brute force attack?

200

Being a ______ Ethical Hacker (CEH) means you’ve been trained to hack into your own system to test it for weaknesses and vulnerabilities.


What is Certified?

200

This term, related to designing houses, can also describe the underlying cybersecurity structure, as well as the technology and policies that support it.

What is architecture?

200

This professional social networking site announced the theft of approximately 700 million user records 2024.

What is Linkedin?

300

A software program designed to prevent, detect, and remove computer viruses.

What is antivirus software?

300

A simulated real-world cyber attack conducted by an organization to evaluate its defenses and vulnerabilities.

What is a red team exercise?

300

This security technology allows organizations to monitor and analyze user and system activities by combining multiple log sources.

What is a SIEM (Security Information and Event Management)?

300

The most basic level or core of an operating system, responsible for resource allocation, file management, and security. In a different context, this word can also mean the seed and hard husk of a cereal.

What is kernel?

300

This “M” computer security company, founded by namesake John in 1987 before being acquired by Intel in 2011, is well known for its anti-virus software that is available to individual consumers.

What is McAfee?

400

Employing a ______ strategy means that every user has to be authenticated no matter what. Whether someone is an authorized user in your organization or someone from outside of it, they have to be verified every time.

What is zero trust?

400

A sophisticated computer worm discovered in 2010 specifically designed to target industrial control systems, particularly those used in Iran's nuclear facilities.

What is Stuxnet?

400

The "CIA Triad" is a fundamental model in security that stands for Confidentiality, Integrity, and _____.

What is Availability?

400

This type of cyber attack uses botnets to flood a web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests.

What is a Denial of Service (DoS) attack?

400

This U.S. government organization is responsible for the creation of their "Cyber Security Framework" or "CSF", used by over half of Fortune 500 companies as their primary security framework.

What is the National Institute of Standards and Technology (NIST)?

500

This is used to monitor and control incoming and outgoing network traffic based on predetermined security rules.

What is a firewall?

500

The year in which Creeper, the first computer virus, was discovered.

What is 1971?

500

Although cartoon bears might like it, a hacker might not enjoy being tricked into hacking this sweet-sounding, eight-letter decoy computer system that's purposely made to attract attackers.

What is a honeypot?

500

Titan Rain was a series of attacks that started in 2003 on U.S. organizations like Lockheed Martin and NASA that originated from this country.

What is China?

500

Massimiliano Montoro developed this password cracking tool for Windows that was named after what biblical pair of brothers with a notable, fatal head-cracking in their story.

Who are Cain and Abel?

M
e
n
u