Ethical Hacking
Social Engineering
Acronyms
Denial-of-Service
Crapshoot
100

The author of this quote: If you know yourself but not the enemy, for every victory gained you will also suffer a defeat.

Sun Tzu

100

The weak point in a network.

What are users.

100

TTP

What are Tactics, Techniques and Procedures

100

An attack that would cause a decoy.

What is the result of a DoS?

100

A program to make worms.

What is The Internet Worm Maker Thing.
200

This type of attack is when a hacker compromises Solarwinds and injects malware into popular programs. 

Distribution Attack

200
The personality of a hacker to be successful in social engineering

What is charming.

200

APT

What is Advanced Persistent Threat

200

The most popular type of devices used for DDoS attacks.

What is IoT

200

The goal of an APT.

What is steal data.

300

Step 3 of the CEH Hacking Methodology.

Enumeration

300
A popular target for social engineers who help with technical issues.
What is helpdesk.
300

OSINT

What is Open Source Intelligence

300

A legitimate use of a single bot.

What is web spidering.
300

A tool that can be used to enumerate networks besides nmap.

What is metasploit.

400

A model that can be used to understand attacks, and defend against them.

cyber kill chain methodology

400

The goal of this is to find parts of a password.

What is shoulder surfing

400

SAM

What is Security Accounts Manager

400

A DoS attack carried out by singing a large ping packet.

What is Ping of Death.

400

Legacy Windows password hash.

What is LM

500

Hacking a system without permission.

What is criminal hacking.

500

The best defense against social engineering.

What is user education?

500

NTLM

What is New Technology LAN Manager

500

A type of malware that is commonly used to create botnets.

What is a Trojan.

500

The ASM op code to copy a variable.

What is MOV.

M
e
n
u