Mixed Bag 1
Malware and More
Threat Vectors and Attack Surfaces
Network Attacks
Mixed Bag 2
100

What are the three different parts of a URL?

Hostname, Domain Name, and Top-Level Domain

100

What is the form of malware that attaches itself to a file and uses it to spread.

Computer Virus

100

What is the term used to describe the initial method used to infiltrate a system or network?

Threat Vector

100

How does an on path attack work?

An attacker places themself between two devices to intercept or modify data

100

What is a small collection of data used to authenticate a user to a website instead of having to login every time?

Cookie

200

Write an example of an Internet of Things (IoT) Device.

Anything that has Wi-Fi or Bluetooth connectivity ("Smart" devices)

200

This form of malware is programmed to "go off" only under a specific set of conditions or at a specific time. What is it?

Logic bomb

200

Who is the client in a client-based attack?

You/your device
200

Network attacks can be classified by two different types. Name those two types.

Passive and Active

200

Name one of the ways an IP address and MAC address are different.

MAC address uses letters, hyphens [ - ] and colons [ : ]

IP addresses use periods [ . ]

300

This type of Phishing attack uses QR codes. What's it's name?

Qishing

300

What is not technically a form of malware, but still consumes system resources?

Bloatware

300

This type of threat vector targets applications or systems that are no longer supported by their developer.

System-Based

300
Name the primary method used to defend against a DDoS attack.

Rate limiting (also IPS and IDS)

300

What is the function of the Service Set Identifier (SSID)?

Functions as the name of a Wi-Fi source

400

What attack targets specific devices to get disconnected from a network?

Deauthentication attack

400

What is the purpose of a rootkit?

Gain administrative access to a person's device

400

What is a Zero Day Attack?

An attack that has no current fixes because nobody was aware of it until an accident occurred

400

What is the function of the Domain Name System (DNS)?

To translate a domain name to an IP address

400

Write down the three pillars of multifactor authentication.

Something you know, Something you are, Something you have

500

What number am I thinking of? Write it down

43

500

Describe the use for cryptomalware

Uses victim's device to generate CPU cycles to generate encryption keys and basically mine cryptocurrency

500

Describe an attack surface.

The sum of all possible vulnerabilities on a network or device

500

Name one of the methods to defend against a wireless attack.

Change any default account login information on your router/network | Use strong encryption | Update your device’s firmware to maintain it’s security | Put IoT devices on a guest network | Keep the location of your router secure

500

What is the difference between misinformation and disinformation?

Misinformation is spread unintentionally, while disinformation is spread intentionally