Cybersecurity Basics
Famous Hacks & History
Tools & Techniques
Cybersecurity Culture
Intermediate Cybersecurity
100

What does the acronym VPN stand for?

What is Virtual Private Network?

100

In 2021, this software company’s supply chain was compromised, affecting thousands of customers including U.S. federal agencies.

What is SolarWinds?

100

This Linux distribution is popular among penetration testers.

What is Kali Linux?

100

A common meme password often used in examples.

What is "password123"?

100

The three core components of the CIA Triad.

What are Confidentiality, Integrity, and Availability?

200

This type of attack tricks users into revealing sensitive information.

What is phishing?

200

In 2017, this ransomware attack affected over 200,000 computers globally.

What is WannaCry?

200

A popular tool for scanning open ports.

What is Nmap?

200

This hacker group is known for the Guy Fawkes mask.

Who is Anonymous?

200

SQL injection vulnerabilities often begin with what character?

What is a single quote (')?

300

The process of converting data into a coded form to prevent unauthorized access.

What is encryption?

300

Kevin Mitnick was once known as the FBI’s most wanted ___.

What is hacker?

300

This tool is often used to find hidden files and directories on web servers.

What is Gobuster?

300

In hacker culture, the number “1337” is often used to mean what?

What is leet or elite?

300

This attack intercepts communication between two parties without their knowledge.

What is a Man-in-the-Middle attack?

400

The most common default port for HTTP traffic.

What is port 80?

400

The company that suffered a massive breach in 2013 exposing over 3 billion accounts.

What is Yahoo?

400

A framework used to develop and execute exploit code against remote targets.

What is Metasploit?

400

This yearly hacker convention held in Las Vegas is famous for its Wall of Sheep and badge hacking.

What is DEF CON?

400

CVE stands for?

What is Common Vulnerabilities and Exposures?

500

What cybersecurity principle refers to giving users the least access necessary?

What is the Principle of Least Privilege?

500

This exploit allowed attackers to extract information from a supposedly secure area of memory in CPUs (hint: 2018 disclosure).

What is Spectre or Meltdown?

500

Name the tool famous for intercepting and modifying HTTP requests.

What is Burpsuite?

500

Mr. Robot’s real identity is revealed to be this person in Elliot’s life.

Who is Elliot’s father?

500

Name the encryption algorithm commonly used in WPA2 wireless security.

What is AES (Advanced Encryption Standard)?

M
e
n
u