Cybersecurity
Network Security
Data Protection
Security Tools and Protocols
Threat and Attacks
100

This term refers to the protection of computer systems from theft or damage.

What is cybersecurity?

100

This type of network filters traffic using a set of rules.

What is a firewall?

100

This type of encryption uses the same key for encryption and decryption.

What is symmetric encryption?

100

This most popular tool - commonly used for penetration testing.

What is Metasploit?

100

This common type of attack tricks users into revealing confidential information.

What is phishing?

200

It's the process of converting data into a cyphertext to prevent unauthorized access.

What is encryption?

200

A secure network protocol used for remote administration.

SSH

200

This asymmetric encryption algorithm is widely used for secure data transmission.

What is RSA (Rivest–Shamir–Adleman)?

200

A protocol used for secure communication over the internet. (web pages)

What is HTTPS?

200

A type of malware that locks files until payment is made.

What is ransomware?

300

The principle that ensures only authorized individuals can access information.

What is confidentiality?

300

A segment of a network designed to expose services while keeping internal networks secure.

What is a DMZ (Demilitarized Zone)?

300

A law that requires companies to protect customer data in the EU.

What is GDPR (General Data Protection Regulation)?

300

Software that detects and removes malicious programs.

What is antivirus software?

300

Attackers inject malicious scripts into websites in this attack.

What is cross-site scripting (XSS)?

400

The CIA triad stands for these three core principles.

What are confidentiality, integrity, and availability?

400

This attack floods a network with traffic to disrupt services.

What is a DDoS (Distributed Denial of Service) attack?

400

Encryption of data being stored 

What is data-at-rest encryption?

400

This protocol ensures safe email transmission.

What is SMTP over TLS (or SMTPS)?

400

This attack targets users by mimicking a legitimate login page.  

What is a phishing or spoofing attack?  

500

Security+ Certificate Vendor

What is CompTIA

500

Protocol used to securely connect to a VPN.

What is IPsec (Internet Protocol Security)?

500

This algorithm replaced DES as a more secure encryption standard.

What is AES (Advanced Encryption Standard)?

500

This tool helps detect unusual activity on a network.

What is an IDS (Intrusion Detection System) or IPS (Intrusion Prevention System)?

500

"This social engineering technique involves an attacker calling and pretending to be IT support to extract login credentials."

What is vishing?

M
e
n
u