Networking
Systems
Defensive Security
Offensive Security
Security Concepts & Frameworks
100

This Cisco IOS command prevents passwords from being saved in plaintext in the running configuration.

What is service password‑encryption?

100

This operating system developed by Microsoft uses the NT kernel.

What is Windows?

100

This security principle states that users and systems should have only the minimum access needed to do their job.

What is the Principle of Least Privilege?

100

This authorized form of hacking is performed to identify vulnerabilities before attackers do.

What is penetration testing?

100

This security model focuses on protecting confidentiality, integrity, and availability.

What is the CIA Triad?

200

This IPv6 address is the equivalent of the IPv4 loopback address 127.0.0.1.

What is ::1?

200

This open‑source operating system kernel is the foundation of distributions like Ubuntu and Fedora.

What is Linux?

200

This type of attack tricks users into revealing sensitive information through deceptive emails or messages.

What is phishing?

200

This phase of an attack focuses on gathering information about a target without directly interacting with it.

What is passive reconnaissance?

200

This term describes the potential for loss when a threat successfully exploits a vulnerability.

What is risk?

300

This Cisco IOS command allows a router interface to automatically obtain its IP address from a DHCP server.

What is ip address dhcp?

300

This Windows tool is used to view running processes, CPU usage, and memory consumption.

What is Task Manager?

300

This device or software filters incoming and outgoing network traffic based on security rules.

What is a firewall?

300

This term describes a weakness in software, hardware, or configuration that can be exploited.

What is a vulnerability?

300

This strategy layers multiple security controls so that no single failure results in a full compromise.

What is defense in depth?

400

OSPF selects routes by dividing a reference bandwidth of 100 Mbps by the interface bandwidth to produce this value.

What is OSPF cost?

400

This Linux command displays running processes in real time and updates continuously.

What is top?

400

This defensive software detects, blocks, and removes malicious code from computers.

What is antivirus software?

400

This attack technique manipulates people rather than systems to gain access to sensitive information.

What is social engineering?

400

This offensive‑to‑defensive framework categorizes adversary behavior into tactics, techniques, and procedures.

What is the MITRE ATT&CK framework?

500

This best practice improves performance when deploying multiple 802.11b wireless access points close to each other.

What is allocating non‑overlapping channels?

500

This is the default file system for modern versions of Windows.

What is NTFS?

500

This security method requires two or more forms of verification before granting access.

What is multi‑factor authentication (MFA)?

500

This offensive security concept describes blending malicious activity into normal system and user behavior to evade detection.

What is living off the land (LotL)?

500

This security model assumes no user or system should be trusted by default, even inside the network.

What is Zero Trust?