Cyber Basics
Networking
Hacking & Threats
Defence
History
100

A type of malware that tricks users into installing it pretending to be something else.

What is a Trojan?

100

The most widely used protocol for browsing the World Wide Web.

What is HTTP?

100

This low skilled threat actor typically hacks for fun and not profit.

What is a script kiddie?

100

This type of software detects and prevents malware based on signatures. 

What is AntiVirus?

100

He is widely credited as the inventor of the World Wide Web.

Who is Tim Berners-Lee?

200

The practice of disguising an email to look like it’s from a trusted sender to steal credentials.

What is Phishing?

200

This Layer 3 device forwards packets between networks.

What is a router?

200

This 2017 ransomware attack was attributed to North Korea, crippling the NHS and spread worldwide.

What is WannaCry?

200

This device originally operated at Layer 4 to block or allow traffic, with more modern versions providing protection at Layer 7. 

What is a firewall?

200

This operating system was created in 1991 and is now the backbone of most servers on the internet.

What is Linux?

300

This four digit code can be used to unlock a smartphone.

What is a PIN?

300

Port 443 is reserved for this secure protocol.

What is HTTPS?

300

This framework, published by MITRE, categorises adversary tactics and techniques.

What is ATT&CK?

300

This concept involves having multiple different controls often at different points along the kill chain.

What is defence-in-depth?

300

This malware, released in 1988, was widely regarded as the first major internet virus.

What is the Morris Worm?

400

This attack overwhelms a server making it unavailable

What is DDoS?

400

This DNS record amps a domain name to an IPv4 address.

What is an A record?

400

This technique exploits leftover data in memory after it was freed.

What is a use-after-free vulnerability?

400
This tool created by Mark Russinivich captures process creation events and command-line arguments on Windows.

What is SysMon?

400

An email transmitted malware spread in 1999 had this touching but insincere subject line. 

What is ILOVEYOU?

500

This security principle means giving a user only the access they need and nothing more.

What is the Principle of Least Privilege?

500

This secure protocol typically is run on port 22, and is the primary method of accessing a Linux server.

What is SSH?

500

This state sponsored group were linked to the SolarWinds supply-chain compromise.

What is APT29 (Cozy Bear)?

500

This is a device used to protect application layer traffic toward websites to control and filter requests.

What is a WAF?

500

This 2003 computer worm affected servers running a popular Microsoft relational database software and was blamed for crashing routers worldwide.

What is SQL Slammer?