Cyber Basics
Malware Madness
Hackers & Attacks
Network & Tools
Cyber History & Culture
100

A step-by-step process used to solve a problem

What is an algorithm

100

Malicious software designed to harm systems

What is Malware

100

A hacker who works ethically to improve security

What is a White Hat

100

A system that filters incoming/outgoing traffic

What is a firewall

100

Famous hacker conference in Las Vegas

What is DEF CON

200

The three core principles of cybersecurity?

CIA Triad or Confidentiality, Encryption, Availability

200

A program that records keystrokes

What is a key logger

200

Fake emails used to steal personal information

What is phishing

200

A tool used to scan networks for vulnerabilities

What is NMAP

200

WWII encryption device used by Germany

What is the Enigma Machine

300

What is the C in the CIA Triad

Confidentiality

300

Malware disguised as legitimate software

What is a worm

300

Overloading a system to shut it down

What is a denial of service attack

300

Command used to trace a packet's route

What is Tracert

300

Famous cyberattack involving US and China tensions

What is the Hainan Island Incident


400

Turning data into secret code is

What is Encryption

400

Self-replicating malware that spreads across networks

What is a worm

400

Intercepting communication between two parties

What is a Man-in-the-Middle Attack

400

A fake system used to trap hackers

What is a honeypot

400

Art sculpture containing encrypted messages

What is the Kryptos Sculpture

500

Ensuring systems are accessible when needed

What is availability

500

A hidden program that gives unauthorized access 

What is a Rootkit

500

A beginner hacker using pre-made tools

What is a Script Kiddie

500

A protocol used to send emails

What is SMTP

500

One of the earliest large-scale cyber espionage attacks

What is Moonlight Maze