What is Cybersecurity?
Hardware, Software, Networks (Unit 2)
Security of Data, Software, Hardware, Networks (Unit 3)
Countermeasures Against Cyberattacks (Unit 4)
Capture the Flag (CTF)
100

What does “cybersecurity” protect?

Data, devices, and networks from digital attacks

100

What is hardware?

The physical parts of a computer

100

What does antivirus software do?

Detects and removes malware

100

What is multi-factor authentication (MFA)?

A login process that uses two or more methods to verify identity

100

What does "CTF" stand for in cybersecurity?

Capture the Flag

200

True or False: Cybersecurity only applies to big companies.

False

200

What is an IP address used for?

Identifying a device on a network

200

What is a firewall?

A system that blocks unauthorized access to/from a network

200

What’s one way to protect your password?

Use long, complex, unique passwords; don’t reuse them

200

What kind of problems are usually in CTF challenges?

Cryptography, web hacking, forensics, reverse engineering

300

What is the CIA Triad in cybersecurity?

Confidentiality, Integrity, Availability

300

What is the purpose of an operating system (OS)?

It manages hardware and software resources

300

What is social engineering?

Tricking people into giving up personal info or access

300

What does “patching” software mean?

Updating it to fix security vulnerabilities

300

What is a flag in a CTF game?

A hidden string of text that proves you solved the challenge

400

Give an example of a cyber threat.

Phishing, malware, ransomware, etc.

400

Name one difference between IPv4 and IPv6.

IPv6 allows more addresses than IPv4

400

What does it mean if data is "at rest"?

It’s stored on a device, not being used or transferred

400

What’s the purpose of encryption?

To protect data by turning it into unreadable code

400

What tool can you use to inspect website code during a CTF?

Browser Dev Tools or “Inspect Element”

500

What is the difference between a threat, vulnerability, and risk?

 possible danger; Vulnerability: weakness; Risk: impact of threat exploiting a vulnerability

500

What are the 7 layers of the OSI model used for?

To explain how data moves through a network

500

What is the difference between confidentiality and integrity in cybersecurity?

Confidentiality = keeping secrets; Integrity = making sure info isn't altered

500

What is a DDoS attack and how can it be stopped?

An attack that overwhelms a server with traffic; use filters or load balancers

500

How can you stay ethical while playing CTFs?

Only use legal CTF environments, don’t hack real systems