cyber security basics
Common Cyber Threats
Cybersecurity Tools and Technologies
cyber Securities best practicies
100

This term refers to the practice of securing a computer system or network to protect against unauthorized access or attacks.

What is cybersecurity?

100

This type of malware is designed to block access to a computer system until a sum of money is paid.

What is ransomware?

100

This network security system monitors and controls incoming and outgoing network traffic based on predetermined security rules.

What is a firewall?

100

This practice involves regularly updating software, operating systems, and applications to patch known vulnerabilities.

What is software patching?

200

The process of converting information into an unreadable format to prevent unauthorized access is known as this.

What is encryption?

200

A malicious software that spreads from one computer to another, often causing damage or disrupting normal operations.

What is a computer virus?

200

A system that tracks, records, and analyzes activities on a computer or network to detect and respond to security incidents.

What is an Intrusion Detection System (IDS)?

200

The principle of providing individuals with the minimum levels of access and permissions necessary to perform their job functions is known as this.

What is the principle of least privilege?

300

A program that appears legitimate but actually carries out malicious activities when executed is called this.

What is a trojan horse?

300

This cyber threat involves overwhelming a system or network with a flood of internet traffic, making it unavailable for legitimate users.

What is a Distributed Denial of Service (DDoS) attack?

300

This tool is used to scan a computer system or network for vulnerabilities that could be exploited by attackers.

What is a vulnerability scanner?

300

Creating multiple, unique passwords for different accounts and changing them regularly is an example of following this cybersecurity best practice.

What is password hygiene?

400

The practice of tricking individuals into disclosing sensitive information, such as passwords, by pretending to be a trustworthy entity is known as this.

What is phishing?

400

Attackers gain unauthorized access to a system by exploiting a software vulnerability that the system's creator is unaware of. This is known as what?

What is a zero-day exploit?

400

A cryptographic protocol that provides secure communication over a computer network, commonly used for secure online transactions.

What is HTTPS (Hypertext Transfer Protocol Secure)?

400

Educating employees about potential cyber threats and how to recognize and avoid them is part of a comprehensive program in this area.

What is cybersecurity awareness training?

500

This authentication method involves confirming a user's identity by using a combination of something they know, something they have, and something they are.

What is multi-factor authentication (MFA)?

500

A cyber attack in which the attacker intercepts and alters communication between two parties without their knowledge.

What is a man-in-the-middle attack?

500

This technology involves the use of unique physical or behavioral traits, such as fingerprints or facial recognition, for user authentication.

What is biometric authentication?

500

In the context of data protection, this practice involves making multiple copies of important data and storing them in different locations.

What is data backup?