Network & File Systems (Ch. 8)
Malware & Threats (Module 9)
Web & Database Security (Module 10)
Wireless & Network Attacks (Module 11)
Encryption & Cryptography (Module 12)
100

This open-source software allows Linux computers to share files with Windows systems.

What is Samba?

100

A type of malware that disguises itself as legitimate software.

What is a Trojan Horse?

100

This web scripting technology from Microsoft enables dynamic pages.

What is ASP or ASP.NET?

100

The broadcast name of a wireless network.

What is SSID (Service Set Identifier)?

100

The process of converting plaintext into unreadable ciphertext.

What is Encryption?

200

This protocol is used for sharing files and printers over a network on Windows systems.

What is SMB (Server Message Block)?

200

This type of malware allows persistent administrative control while hiding its presence.

What is a Rootkit?

200

This programming vulnerability allows attackers to manipulate database queries.

What is SQL Injection (SQLi)?

200

The act of driving around to locate open or unsecured Wi-Fi networks.

What is War Driving?

200

This cryptographic attack tries every possible key combination.

What is a Brute Force Attack?

300

This attack captures and forwards authentication requests between a client and server.

What is an SMB Relay attack?

300

This type of attack manipulates human behavior instead of exploiting code.

What is Social Engineering?

300

This open-source project provides a list of the top 10 web vulnerabilities.

What is OWASP (Open Web Application Security Project)?

300

A suite of tools used to crack Wi-Fi encryption keys.

What is Aircrack-ng?

300

A pair of mathematically related keys is used in this type of encryption.

What is Asymmetric Encryption?

400

: This tool is used to identify vulnerabilities by scanning hosts and networks.

What is Nessus?

400

This worm targeted routers with weak usernames and passwords.

What is Psyb0t?

400

This standard interface lets different databases communicate with applications.

What is ODBC (Open Database Connectivity)?

400

This device can perform man-in-the-middle attacks by mimicking access points.

What is a Wi-Fi Pineapple?

400

This symmetric encryption standard replaced 3DES.

What is AES (Advanced Encryption Standard)?

500

This Microsoft file system improved on FAT but still had security flaws.

What is NTFS (New Technology File System)?

500

This large-scale worm exploited Windows network vulnerabilities in 2008.

What is Conficker?

500

This scripting language is often used on Linux web servers for dynamic websites.

What is PHP (Hypertext Preprocessor)?

500

This organization defines the 802.11 wireless networking standards.

What is the IEEE (Institute of Electrical and Electronics Engineers)?

500

This process hides messages within other files, such as images or audio.

What is Steganography?