ATTACKS, CONCEPTS
& TECHNIQUES
PROTECTING YOUR
DATA & PRIVACY
INFILTRATION
METHODS
PROTECTING THE
ORGANIZATION
POTPOURRI
100

After hacking into ATM systems remotely using a laptop, this attacker worked with the ATM manufacturers to resolve the identified security vulnerabilities...  What type of attacker is this?

What is a GRAY HAT attacker

100

This is the unique name given to a Wi-Fi network 

What is a SSID? 

100

This type of attack results in some sort of interruption of network service to users, devices or applications. 

What is a Denial Of Service attack? (DoS)

100

A security device that monitors and controls incoming and outgoing network traffic, acting as a barrier between a trusted internal network and untrusted external networks.

What is a Firewall?

100

These are written to do harm and be classified into many categories based on how they propagate and behave.

What are Viruses

200

An individual user profile on a social network site is an example of a ________________ identity.


What is "Online"

200

This a program that protects your computer from malicious software

What is Anti-Virus Software

200

A ____________ is a group of bots, connected through the Internet, that can be controlled by a malicious individual or group. 

What is a Botnet?

200

This is a malicious act where a hacker essentially eavesdrops on a conversation to steal information like login credentials, credit card numbers, or other personal details.

What is a "Man-in-the-Middle Attack"

200

Cybersecurity term for "This for That"

What is "Quid Pro Quo?"

300

A security method that requires users to provide multiple forms of identification to access an online account.

What is two factor authentication?

300

What does SSID stand for?

What is Service Set Identifier? (SSID)

300

The most common goal of this, is to increase traffic to malicious sites that may host malware or attempt social engineering

What is SEO Poisoning? (search engine optimization) 

300

a type of social engineering attack where a cybercriminal creates a fabricated scenario  to manipulate a victim into divulging sensitive information.

What is Pretexting?

300

What is the main purpose of cyberwarfare?

To gain an advantage over other NATIONS... ( You MUST say NATIONS in your answer! )

400

What are the foundational principles for protecting information systems as outlined in the McCumber Cube?  

What are Confidentiality, Integrity, and Availability

400

According to the Intro to Cybersecurity Curriculum, in order to prevent unauthorized access to your devices, you should consider using these instead of passwords 

What is a PassPhrase?

400

A type of attack that originates from multiple, coordinated sources, and an interruption of network service to users, devices or applications occurs.

What is a Distributed Denial of Service (DDoS)

400

This is a form of threat detection that involves capturing and analyzing the flow of communication between a user on the local network and a local or remote destination.

What is Behaivor-based Security?

400

This is a hidden method that allows unauthorized access to a computer system or network

What is a "Backdoor?"

500

______________ is an Internet-based conflict that involves the penetration of information systems of other nations.

What is CYBERWARFARE?

500

These are security measures deployed on a network to find AND stop malicious activities. 

What are Intrusion Detection Systems and Intrusion Prevention Systems

500

This is the manipulation of people into performing actions or divulging confidential information.

What is Social Engineering?

500

_____________ is the formal process of continuously identifying and assessing risk in an effort to reduce the impact of threats and vulnerabilities.

What is Risk Management?

500

A collection of repeatable queries or reports that outline a standardized process for incident detection and response

What is a Security Playbook?

M
e
n
u