Cybersecurity basics
Attacks And Defense
Authentication & Access Control
100

What does the CIA triad stand for?  

What is Confidentiality, integrity, and availability

100

 Known as an ā€œethical hackerā€, this type of hacker is authorized to breach systems to identify and fix security vulnerabilities before malicious people can exploit them.

What is a White Hat hacker?

100

In Authentication, a smartphone is an example of...?

What is something you have?

300

This type of attack attempts every possible password combination until the correct one is found, relying on speed rather than stealth.  

What is a brute‑force password attack

300

The very first phase of the Cyber Kill Chain, it involves researching, identifying, and selecting targets.

What is Reconnaissance?

300

What is the type of authentication that requires 2 or more verification factors, such as something you know or something you have?

What is Multi-factor Authentication

500

This way into a computer system lets someone get in without using the normal password, often intentionally left open, allowing them to sneak back in later undetected.

What is a backdoor

500

This term describes an attacker who has sophisticated tools and expertise to remain in a system undetected for as long as possible.

What is an Advanced Persistent Threat (APT)?

500

A company has given limited access to certain files & to certain employees for them to complete daily tasks, along with limiting the viewing of these files only during work hours.

 What is Principle of Least Privilege