Hackers
Social Engineering
Malware
Cyber Attacks
Cryptography
100

A person who is extremely skilled with computers and technology.

What is a hacker?

100

A deceptive email intended to gather information from the recipient. 

What is phishing?

100

A piece of software that is harmful to the end user.

What is malware?

100

Something harmful, damaging, or tricking.

What does malicious mean?

100

The sending of secret messages that only certain people can read.

What is Cryptography?

200

The type of hackers your mentors are.

What is a white hat hacker.
200

Exploitation of psychology to gain access to sensitive information. 

What is social engineering?

200

A program that pretends to be useful or helpful but is actually malware.

What is a Trojan Horse?

200

A malicious attempt made by a hacker to access, damage, or destroy information

What is a Cyber Attack?

200

The name of one way encryption.

What is hashing?

300

A hacker who hacks into a server to steal pictures of cats.

What is a Blackhat hacker? (grey hat is also acceptable as the actions are not explicitly malicious in this example.)

300

The creation of a fake believable story to assist in social engineering.

What is pretexting?

300

Phishing Sites, Popups, Email Attachments, etc...

What are the origins of malware?

300

The constant guessing of passwords through an automated process to eventually guess the password.

What is a brute force attack?

300

A cipher that does not change letters and but puts them into columns to change their order.

What is a Columnar Transposition Cipher?

400

The three kinds of Hackers.

What is Blackhat, Greyhat, and Whitehat?

400

Public information that a hacker can use for reconnaissance. 

What is OSINT(open source intelligence)?

400
An annoying purple monkey that was a type of adware.

Who is Bonzi Buddy?

400

An attack that overwhelms a server with internet traffic.

What is a DDoS(Distributed Denial of Service) Attack?

400

A Cipher that turns letters into numbers and then does math with those numbers.

What is Affine Cipher?

500

A model that lays out the stages of a Cyber Attack

What is the Cyber Kill Chain?

500

Ninety-Eight percent (98%).

What amount of Cyber attacks rely on social engineering?

500

The six types of Malware.

What are Virus, Worm, Trojan, Spyware, Adware, Ransomware?

500

An attack made through a vulnerability previously unknown by the developers.

What is a Zero-Day Attack?

500

A type of one-way encryption.

What is SHA-256

M
e
n
u