Hacking
Password Security
Software & Network Exploits
Malware
System Hardening
100

A word that refers to a known type of attack

What is an exploit?

100

Use a combination of upper, lower, number, and symbol there are 94*94*94*94--or 78,074,896--possible combinations for this.

What is a password?

100

Attacks of this type depend on using false data, or false data that is automatically generated.

What are spoofing attacks?

100

This term refers to bad software, from the French mal, meaning bad.

What is malware?
100

Keeping baseline information on a network and looking for changes is a form of this type of system hardening.

What is network monitoring?

200

Someone who gets paid by a company to attempt to hack into that company's web site, network, databases, etc.

Who is a pen-tester?

200

Longer and more complex passwords are harder to crack using this type of method?

What is brute force?

200

Software that captures all of the traffic on a network regardless of its destination.

What is a packet sniffer?

200

Scareware, encryption, and screen-locking are three versions of this kind of malware.

What is ransomware?

200

Because things change frequently, this should be an ongoing process.

What is system hardening?

300

A weakness in a computer operating system, network, software, or even human user.

What is a vulnerability?

300

A box with writing in it that is distorted, discolored, has lines running across and around it; a set of pictures, you are asked to identify all of the pictures with a cat; or a box that you check that says "I am not a robot" are all examples of this.

What is a Captcha?

300

This exploit occurs when the volume of data exceeds the storage capacity.

What is a buffer overflow?

300

Unlike its cousin Adware, this type of malware collects personal information from your computer.

What is spyware?

300

These are released to protect against known security flaws.

What are patches?

400

Taking advantage of the gullibility, kindness, or inexperience of an individual to obtain information or manipulate a computer system that will be used in a cyber attack.

What is social engineering?

400

A hacker uses an automated process to try to successfully log in to accounts with stolen or illegally obtained log in information.

What is credential stuffing?

400

An exploit where a hacker positions themselves in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

What is a man-in-the-middle attack?

400

The Stuxnet zero-day attack is an example of this form of malware.

What is a worm?

400

These types of updates are less obvious because you are not always alerted to them.

What are firmware updates?

500

Politeness, helping those who we like, helping those in need, and desire to be an expert/sought out/listened to are examples of this.

What are social norms? 

500

In this type of attack, hackers try to guess your password off of a word list from previous breeches.

What is a dictionary or straight attack?

500

This the ultimate goal of a SQLi attack.

What is to gain control of a web application’s database server?

500

Boot Sector, resident, direct action, and polymorphic are types of this form of malware.

What are viruses?

500

Knowing these can help identify possible issues.

What are baseline statistics?

M
e
n
u