One
Two
Three
Four
100
  • A password that combines uppercase and lowercase letters, numbers, and special characters, ideally at least 12 characters long.

What is a strong password?


100
  • : A secure and encrypted connection over a less secure network, such as the Internet.

What is VPN?

100
  • An unskilled individual who uses existing scripts or software to hack into systems, often for reputation or entertainment.

What is a Script Kiddie?


100

The process of verifying the identity of a user or system

: What does Authentication mean?

200
  • Common words, phrases, or variations like "password123."

Common password/weak password/dictionary attacj

200

What does ICMP stand for?


  • : Internet Control Message Protocol.
200
  • An attack where the attacker secretly relays and possibly alters communications between two parties.

What is a Man in the Middle Attack?

200
  • Malicious software designed to harm, exploit, or otherwise compromise computer systems.

What is Malware?


300
  • A security process requiring two different forms of identification to access an account.

Two-Factor Authentication (2FA).


300

A code injection technique that exploits a vulnerability in an application's software by inserting malicious SQL statements

What is SQL Injection?

300

Malicious software disguised as legitimate software

What is a Trojan?


300
  • A type of malicious software that encrypts user files and demands payment for the decryption key.

What is Ransomware?


400
  • A method using a list of likely passwords to gain unauthorized access.

What is a Dictionary Attack?

400
  • A security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

What is a Firewall?


400

A security vulnerability that allows an attacker to inject malicious scripts into content from otherwise trusted websites.

What is Cross-Site Scripting (XSS

400
  • The practice of hiding information within other non-secret data, such as images or audio files.

What is Steganography?


500

What are the phases of Ethical Hacking?

Reconnaissance, Scanning, Gaining Access, and Maintaining Access.

500
  • A framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.

What is the OSI Model?

500

An attack aimed at making a service unavailable by overwhelming it with traffic.

What is a Denial of Service (DoS) Attack or DDoS

500
  • A method used by hackers to guess passwords through trial and error.

What is a Brute Force Attack?