Networking
VPNS
Threats
Cyber Terms
Misc.
100

This is a collection of interconnected devices that can communicate with each other

A Network

100

VPN is an acronym for...

Virtual Private Network

100

What is a type of malware that encrypts files and demands a ransom?

Ransomware

100

What is a security device that monitors and controls network traffic?

Firewall

100

In Europe, what is a soccer field called?

A pitch

200

This Network Device can be inserted wirelessly, or wired, and connects ones personal device to the network

NIC

200

What is the main purpose of a VPN?

To create a secure connection over an untrusted network

200

What is a technique used to manipulate people into revealing sensitive information?

Social engineering

200

What is malicious software designed to harm computers or networks?

Malware

200

How many points is a field goal worth?

3


300

This device is, Simpler and cheaper than switches., and is suitable for small networks with minimal traffic.

Hub

300

How does a VPN encrypt data?

A VPN encrypts data using cryptographic algorithms.

300

What is a vulnerability that is unknown to the software vendor?

Zero-day exploit

300

What is a deceptive technique used to trick people into disclosing personal information?

Phishing

300

What is the body's largest organ?

Skin
400

How many layers are in a basic network?

7

400

What is a VPN tunnel?

A VPN tunnel is a secure, encrypted connection between two devices.

400

What is a network of compromised computers controlled by a malicious actor?

Botnet

400

What is an attack that floods a network with traffic, making it inaccessible?

Denial-Of-Service Attack (DOS)

400

Which country was Alaska bought from?

Russia

500

The two main types of networks based on their geographic scope

LAN and WAN

500

This type of firewall/VPN protects web servers and databases from specific web application attacks

Web Application Firewall (WAF)

500

What is the difference between a threat and a vulnerability?

A threat is a potential danger, while a vulnerability is a weakness that can be exploited.

500

What is a weakness in a system that can be exploited by attackers?

Vulnerability

500
Who is the leading goal scorer in the NHL? 

Wayne Gretzky