Security Concepts
I'm being attacked
Passing the Words
Authentic
Being Malicious
100

This is the main triad focus of cybersecurity.

What is Confidentiality, Integrity, Availability?

100

If I hold your system hostage for money, it is -

What is ransomware?

100

Don't say password! This is the more appropriate term for one.

What is passphrase?

100

This is an example of a type of authentication which is something you are. (Something you know, something you have, something you are)

What is a fingerprint?

100

Explain the difference between virus and worm.

-

200

Unauthorized modification of data falls under which part of the triad?

What is Integrity?

200

This type of attack is when two password hashes end up having the exact same value.

What is a Birthday Attack?

200

Oftentimes, a collection of data, such as a hashed password is stored in this.

What is a database?

200

Fingerprint, Retina scan, Voice, and Face ID are all examples of this type of authentication.

What is Biometrics?

200

This is like spyware, but through pop ups on your computer on a website or window.

What is adware?

300

Prevention + (Detection + Response) = ?

What is Protection?

300

This type of attack automates the process of rapidly testing many potential passwords for a given account using a list of words.

What is a Dictionary attack?

300

What exactly is a hash?

What is a special mathematical function that performs one-way conversion?

300

This is what AAA stands for.

What is Authentication, Access Control, and Accounting?

300

A programmer might install a what on a system, timing it to go off long after they have left the company.

What is logic bomb / time bomb?
400

This state of data is when information is stored in files, databases, or hard drives.

What is Data at Rest?

400

This is the inverse of a Brute Force attack.

What is Password Spraying?

400

Your windows machine typically holds all account details such as usernames and passwords in this.

What is a SAM Registry Hive?

400

This is what you call the little lock next to a website url.

What is a certificate?

400

This is a group of programs installed by an attacker to gain complete control of a computer.

What is a rootkit?

500

This man leaked confidential information from the CIA and NSA, and became a Russian Citizen in 2022.

Who is Edward Snowden?

500
This country is where the first piece of malware was made.

What is Pakistan?

500

List a commonly used hashing algorithm.

What are MD5, SHA256, or SHA512?

500

This length of characters on the chart could take up to 7 quadrillion years to crack with a brute force attack.

What is 18?

500

A software is released, and attacker finds a vulnerability immediately.

What is a zero day?