Network Security
Cryptography
Malware
Web Security
General Cybersecurity
100

This device is used to monitor and filter incoming and out going network traffic based on predetermined security rules.

What is a firewall

100

This algorithm, created by the NSA is a standard for encrypting and decrypting digital data

What is AES (Advanced Encryption Standard)

100

This type of malware encrypts a users' files and demands payment for the decrypting key.

What is ransomware

100

This type of attack involves inserting malicious scripts into a website, which are then executed in the user's browsers

What is cross-site scripting (XSS)
100

This principle states that users should have only the minimum level of access necessary to perform their job functions 

What is the principle of least privilege

200

This protocol, often associated with port 443, is used to secure communications over a computer network

What is HTTPS (Hypertext Transfer Protocol Sercure)

200

This cryptographic concept ensures that a message has not been altered during transmission 

What is integrity

200

This type of malware disguised itself as legitimate software but preforms malicious actions once executed

What is a Trojan Horse

200

This type of web vulnerability allows attackers to execute arbitrary SQL code on a database

What is SQL Injection

200

This type of social engineering attack tricks users into revealing sensitive information by pretending to be a legitimate entity

What is Phishing

300

This type of attack involves overwhelming a network with a flood of traffic to render it unusable.

What is a Distributed Denial of Service (DDoS)

300

The process of transforming readable data into a unreadable forma is know as this?

What is is encryption

300

This type of malware is specifically designed to spy on users and collect their information

What is spyware

300

This HTTP header helps protect against cross-site request forgery attacks by validating requests.

What is the CSRF token

300

This framework is commonly used to assess the security posture of an organization 

What is NIST Cybersecurity Framework

400

This security model requires users to prove their identity using tow or more methods

What is a multi-factor Authentications  (MFA)

400

This type of cryptographic attack attempts to recover the encryption key by trying every possible combination

What is brute force attack

400

This type of attack involves inserting malicious code into a computer's memory to exploit software vulnerabilities.

What is a buffer overflow

400

This web security technique involves restricting the origins from which a web page can load resources

What is Content Security policy (CSP)

400

This term describes a system that is no longer supported by the vendor and is vulnerable to exploits 

What is end-of-life (EOL) Software

500

This network protocol is often used to by attackers to map out and scan networks.

What is Nmap (Network Mapper)

500

This cryptographic technique involves using a pair of keys one public and one private

What is asymmetric encryption

500

This type of malware spreads by copings itself from one computer to another without user intervention

What is worm

500

This web security technique involves restricting the origins from which a web page can load resources

What is a Man-in-the-Middle (MitM) attack

500
This Tool is use to detect and remove malicious software from a computer

What is antivirus software