This ensures information is accurate and not altered by unauthorized users.
Integrity
A social engineering attack using fake emails or messages to trick users into revealing sensitive data.
Phishing
What tool captures and analyzes network packets in real-time?
Wireshark
What is the process of adding random data to passwords before hashing?
Salting
What protocol ensures secure communication over the internet, replacing SSL?
Transport Layer Security (TLS)
What are the three main goals of cybersecurity known as the CIA Triad?
Confidentiality, Integrity, Availability
Phishing conducted over the phone or voicemail.
Vishing
What tool can be used for password cracking and is included in Kali Linux?
John The Ripper
What encryption standard uses a 56-bit key and is now considered weak?
DES (Data Encryption Standard)
An attack that sends fake ARP messages to associate an attacker’s MAC address with another device’s IP address.
ARP spoofing
What term describes making sure that a user is who they claim to be?
Authentication
What attack floods a network with traffic from multiple sources?
Distributed Denial of Service (DDoS)
What online tool is used to find internet-connected devices and vulnerabilities?
Shodan
What access control model grants permissions based on attributes like role or department?
Attribute-Based Access Control (ABAC)
Overloading a switch’s MAC table to force it to broadcast traffic is called
MAC Flooding
What is the process of giving an authenticated user permission to access specific resources?
Authorization
What type of malware encrypts a user’s data and demands payment for decryption?
Ransomware
What tool maps network devices and open ports?
Network Mapper (Nmap)
What is HMAC used for?
Verifying both data integrity and authenticity of a message using a shared secret key.
Copying traffic from one port to another for analysis or monitoring (e.g., IDS) is called?
Port mirroring
A security flaw unknown to the vendor or the public, often exploited before a patch is available is called a?
Zero-day vulnerability
An attack that infects a website commonly visited by the target group to compromise them indirectly.
Watering hole attack
What is OSINT?
Open Source Intelligence — collecting publicly available information for analysis.
What algorithm produces a fixed-length string from data to verify integrity?
Hash
What type of intrusion detection system looks for deviations from normal behavior?
Anomaly-Based IDS