Phishing Frenzy
Ransomware Rampage
Social Engineering Schemes
Exploitation Escapades
Network Nightmares
100

You receive an email claiming to be from your bank, asking you to update your account information. What is this attack called?

What is phishing?

100

A pop-up appears on your screen demanding Bitcoin to decrypt your files. What is this type of malware?

What is ransomware?
100

A person calls pretending to be IT support and asks for your password. What kind of attack is this?

What is a vishing (voice phishing) attack?

100

A vulnerability in an application allows an attacker to execute malicious commands. What is this called?

What is remote code execution?

100

An attacker intercepts communications between two parties without their knowledge. What is this called?

What is a Man-in-the-Middle (MitM) attack?

200

The email includes a link to a fake login page that looks just like your bank’s website. What is the goal of this attack?

What is stealing login credentials or personal information?

200

What is the first thing you should do if you suspect ransomware has infected your system?

What is disconnect the system from the network and alert your IT or security team?

200

Name one psychological tactic attackers use in social engineering.

What is exploiting trust, creating urgency, or using authority?

200

What is the name of the attack where data is injected into a database query to manipulate it?

What is SQL injection?

200

What is a Denial-of-Service (DoS) attack, and how does it work?

What is an attack that overwhelms a system with traffic, making it unavailable to legitimate users?

300

How can you spot a phishing email pretending to be from a trusted organization?

What are signs like spelling errors, suspicious sender addresses, or urgent language?

300

Name one way ransomware can spread through an organization.

What are phishing emails, malicious links, or infected downloads?

300

An attacker leaves a USB drive labeled "Confidential" in a public place, hoping someone will plug it in. What is this technique called?

What is a baiting attack?

300

An attacker tricks a user into downloading malware by embedding malicious code into a legitimate-looking website. What is this called?

What is drive-by download?

300

Name one way to prevent unauthorized access to your Wi-Fi network.

What is use strong passwords, enable WPA3 encryption, and disable WPS?

400

What happens if you download an attachment from a phishing email?

What is potentially infecting your device with malware or giving attackers access to your files?

400

How can organizations protect themselves against ransomware?

What is maintaining regular backups, keeping software up to date, and using strong endpoint protection?

400

What is tailgating, and how can you prevent it?

What is following someone into a secure area without proper authorization, and you can prevent it by enforcing strict access control policies?

400

What is the risk of using outdated or unpatched software?

What is vulnerabilities can be exploited by attackers, putting systems at risk?

400

Why is public Wi-Fi considered a security risk?

What is attackers can eavesdrop on unencrypted communications or set up fake networks?

500

What should you do if you fall victim to a phishing scam?

What is report it to your IT team or the organization, change your password, and monitor your accounts for suspicious activity?

500

What is the ethical dilemma of paying a ransomware attacker?

What is paying the attacker might encourage more attacks, but refusing to pay could mean losing your data permanently?

500

Name a real-world social engineering attack and its impact.

  • What is the Twitter hack of 2020, where social engineering was used to access high-profile accounts?
500

How does a buffer overflow attack work, and why is it dangerous?

What is a buffer overflow occurs when too much data is written to a buffer, causing it to overwrite adjacent memory and potentially execute malicious code?

500

What is ARP poisoning, and how can it compromise network security?

  • What is ARP poisoning involves sending fake ARP messages to a network, allowing an attacker to intercept or redirect traffic?
M
e
n
u