Cyber Basics
Network Security
Malware
Actors
Passwords &
Authentication
100

What does the acronym "CIA" stand for in cybersecurity?

What is Confidentiality, Integrity, and Availability?

100

This device monitors and controls incoming and outgoing network traffic based on predetermined security rules, often acting as the first line of defense in a network.

What is a firewall?

100

An attack that uses fraudulent emails to trick users into revealing sensitive information, often by impersonating a legitimate organization or individual.

What is Phishing?

100

This type of hacker is motivated by personal or financial gain and often operates illegally to exploit systems for profit.

What is a Black Hat hacker?

100

This is the recommended minimum length for a strong password, according to most cybersecurity best practices.

What is 12 characters?

200

The process of transforming data into a secure format that cannot be read without a decryption key is called what?

What is Encryption?

200

A networking protocol commonly used to secure communication over the web by providing encryption for HTTP traffic.

What is HTTPS?

200

This type of malware is designed to replicate itself and spread to other computers without the user’s knowledge, often exploiting system vulnerabilities.

What is a Virus?

200

This type of hacker is often driven by political or social agendas, attempting to disrupt systems or steal data to further their cause.

What is a Hacktivist?

200

This type of authentication requires two or more different factors, such as something you know (a password),  something you have (a smartphone or token), and something you are.

What is MFA (Multi-factor authentication)?

300

Which term describes a program or device used to detect and remove viruses from a computer?

What is Antivirus Software?

300

This type of attack involves overwhelming a system with traffic to make it unavailable to users.

What is a Denial of Service attack?

300

This type of malicious software is designed to block access to a system or files and demand a ransom for the user to regain access

What is Ransomware?

300

This type of hacker uses pre-written tools or software to exploit vulnerabilities, without deep technical knowledge.

What is a Script Kiddie?

300

This method of authentication uses data such as fingerprints, facial recognition, or iris scans to verify identity.

What is biometric authentication?

400

It is a word or phrase that verifies that you and only you had access to the account.

What is a Password?

400

Used to create a secure, encrypted connection over the internet between a user and a network.

What is a VPN?

400

This type of malware, often disguised as legitimate software, installs itself without the user’s consent and can give an attacker remote control over an infected system.

What is a Trojan Horse?

400

These attackers seek to launch coordinated, large-scale attacks, often targeting critical infrastructure to cause widespread damage or disruption.

Who are Cyber terrorists?

400

This is the term for an attack that tries multiple password combinations in a quick and automated manner, often against a single account or system.

What is a Brute Force attack?

500

A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. Internet Explorer, Firefox and Safari are examples of these.

What is a browser? (or web browser)

500

This type of device is used to connect two or more networks, while also filtering traffic to prevent unauthorized access or attacks.

What is a router?

500

This type of malware is a self-replicating program that spreads across networks by exploiting vulnerabilities, often affecting systems without the need for user interaction.

What is a Worm?

500

This type of a hacker works to protect systems and networks.

What is a White Hat hacker?

500

This common attack method involves intercepting login credentials as they travel across an unencrypted network, such as public Wi-Fi.

What is a Man-in-the-Middle (MITM) attack?