Phishing
Hashing
SecOps
Threats
Misc
100

Unsolicited junk emails sent out in bulk to a large number of recipients

What is Spam?

100

A way of taking a piece of data of any length and  representing it in another form that is a fixed length

What is hash?

100

A team of cyber security professionals that monitors the network and its systems to detect malicious cyber security events

What is a Security Operations Center (SOC)?

100

A threat actor motivated by satisfaction

Who is a Thrill-Seeker?

100

Inventor of the World Wide Web

Who is Tim Berners-Lee?

200

A type of phishing that targets high-position individuals

What is Whaling?

200

A free and open-source password-cracking tool

What is John the Ripper?

200

The protocol responsible for resolving hostnames

What is the DNS (Domain Name System)?

200

Any software designed to perform malicious action on behalf of an attacker

What is Malware?

200

The state of being protected against the criminal or unauthorized use of electronic data, or measures taken to achieve this.

What is Cybersecurity?
300

Uses voice calls for the social engineering attack

What is Vishing?
300

When 2 different inputs give the same output

What is Hash Collision?

300

 A security tool, hardware or software that is used to filter network traffic by stopping unauthorized incoming and outgoing traffic.

What is a Firewall?

300

A threat actor motivated by ideological violence

Who is a terrorist?

300

A tool to encrypt all traffic leaving and re-entering your machine

What is a VPN (Virtual Private Network)?

400

Utilized to handle the sending of emails

What is SMTP (Simple Mail Transfer Protocol)?

400

A lookup table of hashes to plaintexts, so you can quickly find out what password a user had just from the hash

What is a Rainbow Table?

400

A security solution that collects and analyzes security events to support threat detection, compliance and incident management.

What is SIEM (Security Information And Event Management)?

400

Used to infect as many systems as possible, encrypting the data on the devices and holding it to ransom.

What is Ransomware?

400

A form of user interface that allows users to interact with electronic devices through graphical icons and audio indicators

What is a GUI (Graphical User Interface)?

500

An alternative protocol for receiving emails that downloads emails from the server to a local device

What is POP3 (Post Office Protocol)?

500

A method of using a cryptographic hashing function to verify the authenticity and integrity of data

What is HMAC?

500

A network management protocol used on IP networks for automatically assigning IP addresses to devices connected to the network using a client–server architecture.

What is the DHCP (Dynamic Host Configuration Protocol)?

500

An advanced, sustained cyberattack wherein an intruder establishes undetected presence in a network in order to steal data over a prolonged period of time.

What is an APT (Advanced Persistent Threat)?

500

Which of our coaches has been improving their Spanish this week?

Who is Kota?