Networking Fundamentals
Security Tools
Threats and Vulnerabilities
Cybersecurity Basics
100

This protocol is commonly used to securely transmit data over the internet by encrypting it. 

What is "HTTPS"?

100

This type of software scans and removes malicious software from a computer system.

What is "antivirus"?


100

This type of attack involves tricking individuals into disclosing confidential information by pretending to be a trustworthy entity.

What is "phishing"?

100

This common cybersecurity practice involves using a combination of letters, numbers, and symbols to protect access to accounts and systems.

What is a "password"?

200

WHat is the primary function of a DNS server in a network?

What is "to resolve domain name to IP addresses"?

200

This type of firewall operates at the application layer and is used to filter traffic based on specific applications or services.

What is an "application firewall"?

200

This term describes a software flaw that can be exploited by attackers to compromise a system or application, often leading to security breaches. 

What is a "vulnerability"?

200

This term describes a security measure that requires users to provide two or more forms of identification before accessing an account or system.

What is "two-factor authentication (2FA)"?

300

This protocol is used to automatically assign IP addresses to devices on a network.

What is "DHCP (Dynamic Host Configuration Protocol)"?

300

This open-source tool is widely used for penetration testing and vulnerability scanning.

What is "Kali Linux"?

300

This type of malware encrypts the victim's files ad demands payment for the decryption key.

What is "ransomware"?

300

This security principle involves separating different components of a system to limit the potential impact of a security breach.

What is "network segmentation"?

400
What is the main difference between TCP and UDP in terms of data transmission.

What is "TCP is connection oriented and reliable, while UDP is connectionless and faster"?

400

This tool provides a secure way to access a remote network by creating an encrypted tunnel over the internet.

What is a "Virtual Private Network (VPN)"?

400

This type of attack targets a system's availability by overwhelming it with excessive traffic, rendering it unusable to legitimate users.

What is a "Denial of Service (DoS) attack"?

400

This term refers to the process of regularly updating software to fix vulnerabilities and improve security.

What is "patch management"?

500

This network device operates at the data link layer and is used to segment a network into collision domains.

What is a "switch"?

500

This type of tool is used to track and log user activity on a network to detect potential security breaches.

What is a "security information and event management system (SIEM) system"?

500

This attack involves intercepting and altering communications between two parties without their knowledge, often used to steal sensitive information.

What is a "man-in-the-middle attack"?

500

This concept refers to the principle of limiting access to information and resources to only those who need it to perform their job functions.

What is "least privilege"?

M
e
n
u