hacking teams
Linux Basics
Hacking Attacks
Cybersecurity Defenses
Types of Malware
100

People who break into computer systems are known as

What is Hacker?

100

This is the command used to list files and directories in a Linux terminal.

What is ls?

100

This attack uses automated bots to crack passwords by trying thousands or millions of possible combinations

What is a brute-force attack

100

This type of software scans and removes malware from computers to protect users from cyber threats.

What is antivirus software?

100

A type of malware that hides in files and spreads by making copies of itself, often damaging files or networks.

What is a virus?

200

This team simulates attacks to test an organization's defenses.

What is the red team?

200

This file system hierarchy is where most user files are stored in Linux.

What is cd?

200

In this type of attack, hackers flood a network with traffic to make a website unavailable."

What is a DDoS (Distributed Denial of Service) attack

200

A cybersecurity technique that scrambles data so only authorized users can read it.

What is encryption?

200

Malicious software that encrypts files and demands payment for the decryption key.

What is ransomware?

300

This team focuses on detecting, responding to, and mitigating security incidents.

What is the blue team?

300

This file system hierarchy is where most user files are stored in Linux.

What is /home?

300

This type of malware attack locks users out of their data until they pay a ransom.

What is ransomware

300

A device that filters incoming and outgoing network traffic based on security rules to prevent unauthorized access.

What is a firewall?

300

This type of malware tricks users into installing fake software that appears legitimate, often allowing unauthorized access.

What is a Trojan horse?

400

This team merges red and blue team efforts to enhance security through shared tactics and techniques.

What is the purple team?

400

This distribution is designed specifically for security professionals and penetration testing.

What is Kali Linux?

400

This social engineering attack tricks people into revealing sensitive information by impersonating a legitimate entity.

What is phishing?

400

This technology encrypts and tunnels data through secure channels to ensure privacy when accessing a network remotely.

What is a Virtual Private Network (VPN

400

A program that installs itself on a device and can be remotely controlled by an attacker to perform tasks or steal information.

What is a botnet

500

Black hat hackers exploit systems for malicious purposes and operate outside the law.

what is Black Hat Hacker?

500

This rolling-release distribution is popular among developers and enthusiasts.

What is Arch Linux?

500

This attack injects harmful code into a website’s input field to steal information or alter functionality.

What is a SQL injection?

500

A method of encrypting data at rest, meaning the data is protected even if the physical storage device is stolen.

What is full-disk encryption?

500

A type of malware that modifies the computer's boot process to take control before the operating system loads. 

What is a rootkit?

M
e
n
u