1
2
3
4
5
100

This is the practice of protecting systems, networks, and programs from digital attacks.

 (What is cybersecurity?)

100

Malicious software that disguises itself as a legitimate program.

(What is a Trojan Horse?)

100

Hackers who work with permission to find vulnerabilities.

(What is a White Hat Hacker?)

100

In 2017, this ransomware attack affected 150 countries and shut down hospitals in the UK.

 (What is WannaCry?)  

100

Software designed to detect and remove malicious programs.

What is Antivirus Software?)

200

The CIA Triad stands for Confidentiality, Integrity, and this.

 (What is Availability?)

200

This type of malware encrypts files and demands payment.

 (What is Ransomware?)

200

Hackers who break into systems for malicious intent or personal gain.

 (What is a Black Hat Hacker?)

200

Tricking someone into giving personal information through fake websites or emails.

(What is Phishing?)

200

A tool that hides your IP address and encrypts your internet connection.

What is a VPN?

300

This type of security focuses on ensuring applications are secure during development.

(What is Application Security?)

300

A self-replicating malware that spreads across networks without user interaction.

(What is a Worm?)

300

Hackers who sometimes act legally and sometimes illegally, depending on the situation.

(What is a Gray Hat Hacker?)

300

An attack where communication between two people is secretly intercepted.

(What is a Man-in-the-Middle attack?)

300

This extra layer of security requires two forms of verification.

What is Two-Factor Authentication?

400

he unique number assigned to each device on a network.

 (What is an IP address?)

400

This type of cyber attack floods a network with excessive traffic.

 (What is a DDoS attack?)

400

Hackers motivated by political or social activism.

(What is a Hacktivist?)

400

This attack inserts malicious code into website input fields.

(What is SQL Injection?)

400

A security device or software that blocks unauthorized access to a network.

(What is a Firewall?)

500

This protocol is used to translate domain names into IP addresses.

(What is DNS?)

500

A group of infected computers controlled remotely as a single entity.

(What is a Botnet?)

500

Hackers backed by governments to target other nations.

(What is a State-Sponsored Hacker?)

500

This type of cybercrime involves stealing credit card information for fraudulent purchases.

 (What is Carding?)

500

A cybersecurity tool used to analyze and capture network traffic.

 (What is Wireshark?)