The Basics
Cyber Threats and Attacks
Cybersecurity Tools and Technologies
Bash Commands
Vulnerabilities and Exploitations
100

This term refers to the practice of tricking individuals into revealing sensitive information through deceptive emails or websites.

What is phishing?

100

In a DDoS attack, this term stands for?

What is Distributed Denial of Service.

100

This software is designed to detect and remove malicious software from a computer.

What is antivirus software?

100

This command is used to list the contents of a directory.

What is ls?

100

This term refers to a flaw or weakness in software or hardware that can be exploited by attackers.

What is a vulnerability?

200

Name a type of authentication method that requires something you know and something you have.

What is two-factor authentication (2FA)?

200

A virus and a worm are both types of this malicious software, but they have a key difference.

What is malware? Difference: A virus requires user interaction, while a worm can spread on its own.

200

A Security Information and Event Management (SIEM) system helps organizations collect and analyze this type of data for security purposes.

What is log and event data?

200

To navigate to the home directory, you can use this command.

What is cd?

200

A "zero-day vulnerability" is called "zero-day" because of this characteristic.

What is it being exploited on the same day it's discovered?

300

This is a broad category of software that includes viruses, spyware, and ransomware. Give an example.

 What is malware? Example: WannaCry.

300

In this type of attack, hackers encrypt a victim's files and demand a ransom for their decryption.

What is ransomware?

300

This practice involves simulating cyberattacks to identify vulnerabilities in a system.

What is penetration testing?

300

This command allows you to create a new directory.

 What is mkdir?

300

In a "buffer overflow" vulnerability, an attacker can exploit excessive data input to do this to a system.

What is execute malicious code or crash the system?

400

This protective barrier filters network traffic and helps prevent unauthorized access to a network.

What is a firewall?

400

This type of attack relies on manipulating individuals into revealing confidential information or performing actions that compromise security.

What is social engineering?

400

This process involves converting data into a code to prevent unauthorized access, ensuring confidentiality.

What is encryption?

400

To copy files or directories, you can use this command followed by the source and destination paths.

What is cp?

400

"SQL injection" is an attack that targets this type of database security vulnerability.

What is improperly sanitized user input?

500

This technology is used to create a secure and private connection over a public network, such as the internet.

What is a Virtual Private Network (VPN)?

500

Name one method to protect against phishing attacks.

What is user education and awareness, email filtering, or using an anti-phishing tool?

500

Name two popular open-source cybersecurity tools.

What are Wireshark and Snort?

500

This command is used to search for text within files.

What is grep?

500

To prevent vulnerabilities, it's crucial to keep software and systems updated with these.

What are patches and security updates?