Cyber Security Basics
Threats and Attacks
Security Tools
Policies & Compliance
Fun Facts in InfoSec
100

What does the CIA stand for in cybersecurity?

Confidentiality, Integrity, and Availability. 

100

What is the difference between phishing and spear phishing?

Phishing is broad and generic; spear phishing targets specific individuals or organizations.

100

What does a VPN do?

Encrypts internet traffic and hides your IP address

100

What does GDPR stand for?

General Data Protection Regulation

100

What was the first computer virus called?

Creeper

200

What is the process of converting data into a coded form?

Encryption

200

What kind of attack floods a system with traffic to crash it?

DDoS (Distributed Denial of Service)

200

What is SIEM used for / stand for? 

Security Information and Event Management – collects and analyzes security data


200

What is the difference between a policy and a procedure?

A policy is a rule; a procedure is how to follow the rule


200

What is the name of the cybersecurity conference held annually in Las Vegas?

DEF CON


300

What is the term for verifying a user's identity?

Authentication

300

What is the term for malware that encrypts files and demands payment for decryption

Ransomware

300

What is the primary function of a honeypot in cybersecurity?

To lure attackers into a decoy system to study their behavior and protect real assets.

300

What is the difference between SOX and HIPAA compliance?

SOX relates to financial data integrity; HIPAA pertains to protecting health information.

300

Which cybersecurity-themed TV show features a hacker named Elliot Alderson?

Mr. Robot.

400

What is the difference between symmetric and asymmetric encryption?

Symmetric uses one key for encryption and decryption; asymmetric uses a public and private key pair.

400

What is a zero-day exploit?

An attack that occurs on the same day a vulnerability is discovered

400

What is the difference between IDS and IPS?

IDS (Intrusion Detection System) monitors and alerts; IPS (Intrusion Prevention System) actively blocks threats.

400

Which regulation mandates breach notification within 72 hours in the EU?

GDPR

400

Which U.S. president signed the first executive order on cybersecurity?

President Barack Obama.

500

What is a rainbow table attack and how can it be mitigated?

It's a precomputed table for reversing cryptographic hash functions; mitigated by using salted hashes.

500

What is a logic bomb in the context of malware?

Malicious code triggered by specific conditions or actions, often hidden within legitimate software.

500

What is the difference between black-box, white-box, and gray-box testing?

Black-box has no internal knowledge, white-box has full access, and gray-box has partial knowledge of the system.

500

Which ISO standard focuses specifically on risk management?

ISO 31000

500

Which U.S. state was the first to enact a data breach notification law?

California

M
e
n
u