People who break into computer systems are known as
What is Hacker?
This is the command used to list files and directories in a Linux terminal.
What is ls?
This attack uses automated bots to crack passwords by trying thousands or millions of possible combinations
What is a brute-force attack
This type of software scans and removes malware from computers to protect users from cyber threats.
What is antivirus software?
A type of malware that hides in files and spreads by making copies of itself, often damaging files or networks.
What is a virus?
This team simulates attacks to test an organization's defenses.
What is the red team?
This file system hierarchy is where most user files are stored in Linux.
What is cd?
In this type of attack, hackers flood a network with traffic to make a website unavailable."
What is a DDoS (Distributed Denial of Service) attack
A cybersecurity technique that scrambles data so only authorized users can read it.
What is encryption?
Malicious software that encrypts files and demands payment for the decryption key.
What is ransomware?
This team focuses on detecting, responding to, and mitigating security incidents.
What is the blue team?
This file system hierarchy is where most user files are stored in Linux.
What is /home?
This type of malware attack locks users out of their data until they pay a ransom.
What is ransomware
A device that filters incoming and outgoing network traffic based on security rules to prevent unauthorized access.
What is a firewall?
This type of malware tricks users into installing fake software that appears legitimate, often allowing unauthorized access.
What is a Trojan horse?
This team merges red and blue team efforts to enhance security through shared tactics and techniques.
What is the purple team?
This distribution is designed specifically for security professionals and penetration testing.
What is Kali Linux?
This social engineering attack tricks people into revealing sensitive information by impersonating a legitimate entity.
What is phishing?
This technology encrypts and tunnels data through secure channels to ensure privacy when accessing a network remotely.
What is a Virtual Private Network (VPN
A program that installs itself on a device and can be remotely controlled by an attacker to perform tasks or steal information.
What is a botnet
Black hat hackers exploit systems for malicious purposes and operate outside the law.
what is Black Hat Hacker?
This rolling-release distribution is popular among developers and enthusiasts.
What is Arch Linux?
This attack injects harmful code into a website’s input field to steal information or alter functionality.
What is a SQL injection?
A method of encrypting data at rest, meaning the data is protected even if the physical storage device is stolen.
What is full-disk encryption?
A type of malware that modifies the computer's boot process to take control before the operating system loads.
What is a rootkit?