Security
Infra
Services/Protocols
CPTC
CCDC
100

This tool securely stores and generates strong passwords for all your accounts.

What is a password manager (e.g., Bitwarden)?

100

This device allows multiple devices to share one internet connection inside a local network.

What is a switch?

100

This service translates domain names (like google.com) into IP addresses.

What is DNS?

100

This tool is used to scan networks for open ports and identify running services on a target.

What is Nmap?

100

This service allows remote graphical access to a Windows desktop over a network and typically supports one active session per user.

What is Remote Desktop Protocol (RDP)?

200

This browser indicator shows that a website connection is encrypted between the user and the server.

What is HTTPS (padlock icon / TLS encryption)?

200

This is a software-based computer that runs an operating system like a physical machine.

What is a Virtual Machine (VM)?

200

This protocol allows secure remote access to a computer over a network.

What is SSH?

200

This tool is used to brute-force hidden directories and files on a web server using wordlists.

What is Gobuster?

200

This Linux directory contains logs such as authentication logs and system events.

What is /var/log/?

300

This is an attack technique where attackers trick users into clicking malicious links in emails or messages.

What is phishing?

300

This software layer allows multiple virtual machines to run on a single physical machine.

What is a hypervisor?

300

This service automatically assigns IP addresses to devices on a network.

What is DHCP?

300

A Linux service is running as root and has a writable configuration file owned by a normal user. What vulnerability does this create?

What is privilege escalation via misconfiguration?

300

This command is used to view active network connections on Linux.

What is ss or netstat?

400

Before entering credentials on a login page, a user checks the domain, certificate validity, and whether the site is using HTTPS. What security practice is being applied?

What is verifying TLS certificate validity and domain authenticity (or trust verification of a secure connection)?

400

This infrastructure setup splits a network into smaller segments to improve security and performance.

What is subnetting?

400

This directory service is used to manage and authenticate users in a network environment.

What is LDAP?

400

You find that a web app uses predictable session tokens. What is the primary security risk?

What is session hijacking?

400

You find a service listening on port 4444. What is this most likely?

What is a potential reverse shell or backdoor (often used by tools like Metasploit)?

500

A user receives a login page that looks identical to a real service, but the URL is slightly misspelled and the certificate is self-signed. What type of attack is this attempting to perform?

What is a credential phishing attack (or man-in-the-middle phishing site)?

500

This virtual hardware component gives each VM its own network identity on the same physical machine.

What is a virtual network interface (vNIC)?

500

This network function translates private IP addresses to a public IP address to allow multiple devices to share one (or more) external address.

What is NAT (Network Address Translation)?

500

This critical Active Directory vulnerability (CVE-2020-1472) allows attackers to completely compromise a domain controller by exploiting a flaw in Netlogon authentication.

What is Zerologon?

500

This Windows feature allows users or programs to run scripts and programs automatically at specific times or at system startup. Why is it dangerous in a security context?

What is Task Scheduler, which can be abused to maintain persistence or execute malicious code automatically?

M
e
n
u