Social Engineering
CIA Triad
Computer Components
Networking
Attacks
100

This term refers to the psychological manipulation of people into performing actions or divulging confidential information.

What is social engineering?

100

This component of the CIA triad focuses on ensuring that information is only accessible to those authorized to view it.

What is confidentiality?

100

This component is often referred to as the "brain" of the computer, responsible for processing instructions.

 What is the Central Processing Unit (CPU)?

100

This protocol is used to securely transmit data over the internet, providing a secure channel over an insecure network

What is HTTPS (Hypertext Transfer Protocol Secure)?

100

This type of cyberattack involves sending fraudulent emails that appear to be from a reputable source to trick individuals into revealing personal information.

What is phishing?

200

Phishing is a common method of social engineering that often uses this type of communication to trick victims.

What is email?

200

This part of the CIA triad ensures that data remains accurate and unaltered during storage and transmission.

What is integrity?

200

This type of memory temporarily stores data that is being used or processed by the CPU.

What is Random Access Memory (RAM)?

200

This type of attack involves overwhelming a network with traffic to disrupt service availability.

What is a Denial of Service (DoS) attack?

200

This cyberattack method uses malicious software to encrypt a victim's files, demanding payment for the decryption key.

What is ransomware?

300

This social engineering technique involves posing as a trusted individual to gain sensitive information from a target.

What is pretexting?

300

This aspect of the CIA triad refers to ensuring that information and resources are available to authorized users when needed.

What is availability?

300

This component is used to store data permanently and is non-volatile, meaning it retains information even when powered off.

What is a Hard Disk Drive (HDD) or Solid State Drive (SSD)?

300

This network device is used to connect multiple devices within a local area network (LAN) and can also filter traffic.

What is a switch?

300

In this cyberattack, hackers exploit vulnerabilities in software to gain unauthorized access to a system, often leading to data breaches.

 What is an exploit or a zero-day attack?

400

This type of social engineering attack involves creating a sense of urgency to trick individuals into making hasty decisions.

What is urgency or scare tactics?

400

Encryption is a common method used to protect this component of the CIA triad.

What is confidentiality?

400

This component connects the CPU to other parts of the computer and allows for communication between them.

What is the motherboard?

400

This type of malware disguises itself as legitimate software but can harm your system once installed.

What is a Trojan horse?

400

This type of attack involves intercepting and altering communication between two parties without their knowledge.

What is a man-in-the-middle (MitM) attack?

500

This tactic in social engineering involves an attacker gaining physical access to a restricted area by impersonating an employee or a maintenance worker.

What is tailgating or piggybacking?

500

A data breach that compromises the accuracy of information would violate this part of the CIA triad.

 What is integrity?

500

This device converts digital signals from the computer into analog signals for transmission over telephone lines or other media.

What is a modem?

500

This security mechanism uses a combination of hardware and software to monitor and control incoming and outgoing network traffic based on predetermined security rules.

What is a firewall?

500

This term describes the act of observing someone’s private information, such as passwords or PINs, by looking over their shoulder.

What is shoulder surfing?