Cyber Security Basics
Social Engineering
Threats and Vulnerabilities
Cybersecurity Solutions
Case Studies
100

What does the CIA triad in cybersecurity stand for?

Confidentiality, Integrity, Availability.

100

What is the term for voice calls designed to trick a user into revealing sensitive information?

Vishing call.

100

What kind of malware locks files and demands payment to unlock them?

Ransomware.

100

What is a two-step verification process to enhance security called?

Two-Factor Authentication (2FA).

100

This 2022 breach exposed the sensitive data of nearly 10 million Australians.

Optus data breach

200

What is the name of the process of converting cleartext data into a secure code to prevent unauthorized access?

Encryption

200

What is a social engineering tactic that involves creating a fake scenario to obtain information?

Pretexting

200

When a highly skilled, well-funded group conducts prolonged and stealthy cyber intrusions, what is this known as?

Advanced Persistent Threat (APT).

200

This model assumes no user or device can be trusted by default. What is it called?

Zero Trust Security Model.

200

In 2017, this company experienced a data breach affecting 147 million people.

Equifax

300

This type of attack aims to make a service unavailable by overwhelming it with traffic. What is it called?

Denial-of-Service (DoS)  

300

This type of phishing targets specific individuals or organizations with personalized messages. What is it called?

Spear phishing.

300

What type of vulnerability allows attackers to intercept and alter communications between two parties without their knowledge?

Man-in-the-Middle (MITM) attack.

300

What is the practice of simulating cyber attacks to test an organization's defenses?

Penetration testing.

300

What cybercriminal group is known for hacktivist activities like Operation Payback?

Anonymous.

400

What type of malware disguises itself as a legitimate program to trick users into installing it?

Trojan Horse 

400

What social engineering tactic exploits human greed (such as a free prize) or curiosity (such as a USB lying around) to trick someone into revealing information? 

Baiting

400

This technique involves repeatedly attempting different combinations of passwords until the correct one is found.

Brute Forcing.

400

 This practice involves dividing a network into isolated segments to limit the spread of a potential attack. 

Network Segmentation.

400

What was the root cause of the Australian Red Cross Blood Service data breach?

An unsecured backup database managed by a third-party vendor.

500

What is a zero-day vulnerability?

A previously unknown vulnerability in software that has not yet been patched.

500

What is the process of confirming a person's identity using a different communication method, such as calling a known number or using a secure app, to verify a suspicious request?  

Out-of-band verification

500

When attackers manipulate input fields on a website to execute commands on the backend server, what is this attack called?

SQL Injection.

500

This advanced method uses machine learning algorithms to detect anomalies in user behavior that may indicate a breach.

User and Entity Behavior Analytics (UEBA).

500

What type of vulnerability allowed attackers to breach Medibank in 2022?

Unsecure APIs.

M
e
n
u