Network security


Cryptography















































Cybersecurity/Unauthorized
100

This network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules.

What is a firewall?

100

This is the term used when attackers use social media profiles to gather personal information about individuals, which they later use to exploit weaknesses.

What is social profiling?

100

This technique is used to prevent malware from spreading by disconnecting affected systems from the network during a security beach. 

What is isolation?

200

This protocol is widely used for securely transmitting data over the internet, ensuring encryption and authentication.

What is HTTP?

200

This type of attack involves tricking users into clicking on malicious links or  downloading attachments that appear to be legitimate,

What is phishing?

200

This term refers to the process of monitoring systems for any sings of unauthorized access or potential security breaches.

What is intrusion detection?

300

This type of attack involves intercepting and altering communication between two parties without them knowing.

What is a man-in-the-middle attack?

300

This term to a measure taken to prevent unauthorized and data, often implemented in security protocols and system.

What is authentication

300

This type of malware is designed to give unauthorised control over a computer, often for malicious purposes, such as spying.

What is a rootkit?

400

This type of malware disguises itself as legitimate software and often tricks users into downloading it

What Trojan horse?

400

This security principle is based on granting the least amount of access necessary for users to perform their job function.

What is the principle of least privilege?

400

This term refers to the act of ensuring that sensitive data is only accessible by authorized individuals, preventing unauthorized access or disclosure.

What is risk mitigation?

500

This type of attack overwhelms a system or network with excessive traffic, rendering it unavailable to users.

What is a denial-of-service (DoS) attack?

500

This type of malware is self-replicating and spreads across a network without needing human interaction.

What is a woem?

500

This method is used to control network traffic and prevent unauthorized access by segmenting different areas of a network.

What is network segmentation?