Cybersecurity Basics
Networking Fundamentals
Programming Fundamentals
Encryption & Cryptography
Operating Systems
100

This practice of sending fraudulent messages to trick people into revealing private information or passwords

What is phishing?
100

Network device that forwards packets between different networks.

What is a router?

100

A sequence of instructions a computer executes to perform a task.

What is a program?

100

Encryption type that uses the same key to encrypt and decrypt data.

What is symmetric encryption?

100

Core part of the OS that manages hardware, processes, and system calls.

 What is the kernel?

200

Software created to damage, exploit, or otherwise harm a computer system.

What is malware?

200

The protocol used to transfer and render standard web pages.

 What is HTTP?

200

Loop structure that continues while a condition remains true.

 What is a while loop?

200

A widely used public-key algorithm often used to secure web traffic.

What is RSA?

200

Fast temporary storage of data to speed up repeated access.

What is caching?

300

 An access control model that assigns permissions based on a user’s job function.

What is role-based access control (RBAC)?

300

The numerical label assigned to each device on an IPv4 network.

 What is an IP address?

300

Data structure that stores key–value pairs for fast lookup.

What is a dictionary (or map)?

300

A function that maps input to a fixed-length string and is designed to be irreversible.

What is a cryptographic hash (a one-way function)?

300

OS feature that lets multiple programs run so users think they run at the same time.

What is multitasking?

400

The process of scrambling data so only authorized parties can read it.

What is encryption?

400

Technique that translates private IP addresses to a public one for internet access.

What is Network Address Translation (NAT)?

400

The activity of locating, diagnosing, and fixing code errors.

 What is debugging?

400

 Successor to SSL that secures HTTP connections and other traffic.

What is TLS (Transport Layer Security)?

400

Safeguard that prevents one process from reading or writing another’s memory.

What is memory protection?

500

An attack that overwhelms a service or network with traffic to make it unavailable.

What is a Denial of Service (DoS) or Distributed Denial of Service (DDoS) attack?

500

Secure file-transfer protocol that runs over an encrypted SSH connection.

What is SFTP?

500

OOP principle that bundles data and methods, hiding internal state.

 What is encapsulation?

500

Authentication method where a server sends a challenge and the client proves knowledge without sending the password directly.

What is challenge–response authentication?

500

OS technique that uses disk space to make programs think they have more RAM than physically available.

What is virtual memory (paging)?

M
e
n
u