Types Of Threats
In the beginning
Technically Cyber
No Breach for Me
Hackers Gonna Hack
200

This is a person who breaks into a computer system for politically or socially motivated purposes.

What is a Hacktivist?

200

Protection of networked systems and data

What is Cybersecurity?

200

This tool is used to lure an attacker to analyze the behavior of the attack. 

What is Honeypot? 

200

Downloading software only from trusted websites is the best method to avoid getting this. 

What is malware or spyware or viruses?

200

These programs track where you go on the Internet and what you type into your keyboard.

What is Spyware?

400

This is the threat presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

What is an Insider Threat?

400

The term that ensures data is accessed only by authorized individuals

What is Confidentiality 

400

Creating an alert and logging the detection is an action of this device.  

What is IDS? (Intrusion Detection System)

400

Security implementation of biometrics authentication.  (List two)

What are Fingerprint, Palm print, voice and facial recognition?

400

Malware can self-replicate (can download automatically), but only this malware requires you to do something, such as click on an email link, to actually activate it.

What is a virus?

600

This is one of the Certification Exams offered through TestOut.

What is CompTia Security+ or CompTIA Network, or CompTIA A+, 

600

This leg of the cybersecurity triad could be met by adding more host devices and web servers for access and redundancy.  

What is Availability? 

600

The main purpose of this tool is to perform port scanning for open ports.  

What is Nmap or Netcat? 

600

Logging into Zoom using the "sign in using Google" link is an example of this. 

What is Open Authorization? 

600

This type of malware may masquerade as legitimate software but contains malicious instructions that may harm your computer.

What is a Trojan?

800

The weakest link in Cybersecurity.

What are Human Beings?

800

This component of the cybersecurity triad confirms data is unaltered during transit and unchanged 

What is Integrity?

800

Malware is a portmanteau of these two words.

What is Malicious Software?

800

This leg of the cybersecurity triad is violated when medical offices send patient records through an email.  

What is confidentiality? 

800

This is a type of attack that uses other zombie computers.

What is DDos? (or DoS)

1000

All the new devices being hooked to the internet (cameras, thermostats, cars, etc) are known as....

What are IOT Devices? Internet of Things 

1000

The main purpose of this internet-based conflict involving the networks and computer systems of other nations is to gain advantage over adversaries. 

What is Cyberwarfare?

1000

The goal for this team is to ensure company, system, and data preservation through timely investigations into security incidents.  

What is Computer Security Incident Response Team?

1000

These two tools can be used to detect anomalous behavior, command and control traffic, and infected hosts.  

What are intrusion detection system and network traffic logging? 

1000

Someone who hacks to find and report vulnerabilities.

What is a White Hat hacker? 

M
e
n
u