CIA
Threat Actors
Malware and Apps
Social Engineering
Cryptography
100

The three goals of cybersecurity: Confidentiality, Integrity, and Availability.   

What is the CIA Triad?

100

A beginner attacker who uses existing tools and has a low skill level

What is a Script Kiddie?

100

Malicious software that encrypts a user's files and demands payment

What is Ransomware?

100

Fraudulent messages, typically email, used to steal credentials or data.   



What is Phishing?

100

The type of encryption that uses the same key for both encryption and decryption.   



What is Symmetric Encryption?

200

This principle means users receive only the minimum access necessary to perform their duties.   



What is Least Privilege?

200

These threat actors are politically or socially motivated.   



What are Hacktivists?

200

This attack involves inserting malicious SQL code into a web page field to manipulate databases.

What is SQL Injection (SQLi)?

200

A highly targeted phishing attempt against specific individuals.   



What is Spear Phishing?

200

This one-way function is used to ensure data integrity.   



What is Hashing?

300

The practice of layering multiple security controls (like MFA + firewalls + IDS) to protect systems

What is Defense in Depth?

300

Highly skilled, well-funded threat actors with long-term strategic goals, often targeting espionage or intellectual property.   



What are Nation-states or APT groups?

300

Malware that disguises itself as legitimate software.   



What is a Trojan?

300

This technique uses a fabricated story to gain a victim's trust and information.

What is Pretexting?

300

In asymmetric cryptography, this key is kept secret and used for decryption or digital signing.   



What is the Private Key?

400

The CIA component secured by methods like encryption and access controls.

What is Confidentiality?

400

A type of threat actor that has legitimate access to a system, such as an employee or contractor.   



What is an Insider?

400

A vulnerability where an attacker runs code on a target system.

What is Remote Code Execution (RCE)?

400

The act of following an authorized person through a secure access point without using one's own credentials.

What is Tailgating or Piggybacking?

400

A random value added to a password before hashing to prevent rainbow table attacks.

What is a Salt?

500

The CIA component secured by methods like hashing, checksums, and versioning.   



What is Integrity?

500

The primary motivation for Organized Crime and the goal of most ransomware attacks

What is financial motivation?

500

A network of compromised machines controlled by an attacker and used to launch large-scale attacks.

What is a Botnet?

500

A form of phishing that specifically targets executives or high-value individuals.

What is Whaling?

500

The framework that manages digital certificates, keys, and trusted entities like Certificate Authorities (CAs).

What is Public Key Infrastructure (PKI)?