Network Security
Digital Forensics
Cryptography
Red Team / Pen Testing
Miscellaneous
100

What does “HTTPS” stand for?

HyperText Transfer Protocol Secure

100

What does “chain of custody” refer to in digital forensics?

Documentation of who handled evidence and when

100

What does the acronym AES stand for?

Advanced Encryption Standard

100

What does the acronym SQL in SQL Injection stand for?

Structured Query Language

100

What is “phishing”?

A social engineering attack that tricks users into giving sensitive info (like passwords)

200

Which device is primarily used to separate and filter traffic between trusted and untrusted networks?

A firewall

200

What’s the difference between volatile and non-volatile data?

Volatile data is lost when power is removed (RAM); non-volatile persists (disk)

200

Which type of cryptography uses two keys: a public key and a private key?

Asymmetric cryptography

200

What tool is widely used for automated vulnerability scanning and exploitation?

Metasploit Framework

200

In cybersecurity, what does CIA stand for? (Not the Central Intelligence Agency)

Confidentiality, Integrity, Availability

300

In networking, what’s the difference between TCP and UDP?

TCP is connection-oriented and reliable; UDP is connectionless and faster but less reliable

300

Which file system artifact stores the timestamps (created, modified, accessed) for files on Windows systems?

The Master File Table (MFT)

300

What’s the primary weakness of the Caesar cipher?

It’s vulnerable to frequency analysis (only 25 possible shifts)

300

What’s the difference between black box, white box, and gray box penetration tests?

Black box = no internal knowledge; white box = full knowledge; gray box = partial knowledge

300

What is social engineering in cybersecurity?

Manipulating people into revealing information or performing actions that compromise security

400

What’s the name of the attack where an attacker intercepts and possibly alters communication between two parties without their knowledge?

Man-in-the-Middle (MITM) attack

400

What tool is commonly used to acquire a bit-for-bit copy of a disk for forensic analysis?

dd (or FTK Imager, EnCase, etc.)

400

What is the main purpose of a cryptographic hash function?

To create a fixed-length output (digest) from input data, used for integrity verification and digital signatures

400

Which Nmap flag performs a stealth SYN scan, often called “half-open” scanning?

-sS

400

Which major U.S. law governs how organizations must protect health information (HIPAA, SOX, or GDPR)?

HIPAA (Health Insurance Portability and Accountability Act)

500

BGP hijacking is a major internet-level attack. What does BGP stand for and what is its purpose?

Border Gateway Protocol; it controls routing between autonomous systems on the Internet

500

What does the Windows “Recycle Bin” actually do with a deleted file?

It moves the file to a hidden system folder and marks it as deleted, but does not immediately erase the data

500

What is the difference between symmetric and asymmetric encryption in terms of speed and key usage?

Symmetric uses one key and is faster; asymmetric uses a key pair and is slower but enables secure key exchange

500

Explain the difference between privilege escalation via “vertical” and “horizontal” techniques.

Vertical = gaining higher privileges (e.g., user → admin); horizontal = accessing another user’s resources with the same privilege level

500

What is the main goal of multifactor authentication (MFA)?

To increase security by requiring more than one type of verification (something you know, have, or are)