Threats & Threat Actors
Cybersecurity Hygiene
Terminology
Ethics
Basic Computer Networking
100

The name for fake emails or messages designed to steal personal information.

What is phishing?
100

Using an extra layer of security, like a code sent to your phone.

What is multi-factor authentication?

100

What does this stand for: IP address

What is Internet Protocol Address?

100

The type of hacker that works legally to protect systems.

What is a White-Hat Hacker?

100

The role of an IP address.

What is identifying devices on a network?

200

The type of hacker that uses pre-made tools and has minimal technical skills.

What are Script Kiddies?

200

Important to do regularly, to ensure you don't lose important files.

What is backing up your data?

200

Smallest unit of data in a computer.

What is a bit?

200

Is it ethical to report a security vulnerability you find in a website?

Yes!

200
The class of IP addresses used for large networks.

What is Class A?


300

A type of cyberattack that encrypts files and demands payment to unlock them.

What is ransomware?

300

Dangerous to do because if one account is compromised, all accounts are compromised.

What is using all the same passwords?

300

Bit difference in IPv4 and IPv6.

What is 32-bit vs 128-bit?

300

The name for preventing someone from denying their actions in a system.

What is non-repudiation?

300
The difference between public and private IP addresses.

What is: used on the internet vs on local networks?

400

What APT stands for, and who typically uses it.

What is Advanced Persistent Threat, state-sponsored hackers?

400

Important to do as soon as it becomes available, because it patches security vulnerabilities.

What is updating software regularly?

400

The term for software designed to harm or exploit a computer system.

What is malware?
400

What ethical principle requires you not to access data you're not authorized to view?

What is integrity?

400

The process that translates private IP addresses into public IPs for internet access.

What is Network Address Translation?
500

The type of malware that spreads itself across networks without needing user interaction.

What is a worm?

500

Best way to minimize digital footprint.

What is avoiding oversharing personal information online or deleting unused accounts?
500

The term for dividing a network into smaller, manageable sub-networks.

What is subnetting?
500

The U.S. law that made unauthorized computer access illegal.

What is the CFAA (Computer Fraud and Abuse Act)?

500

The purpose of a subnet mask in networking.

What is: to define which part of an IP address is the network and which is the host?