CyberSecurity Fundamentals
Networking Basics
Operating Systems & Accounts
Malware & Attacks
Scenarios & Critical Thinking
100

What is social engineering?

Manipulating people into giving up information

100

What does IP stand for?

Internet Protocol

100

Why are system updates important?

They close security holes and improve protection

100

What is ransomware?

Malware that locks data for payment

100

A system slows down and shows pop-ups. What is likely happening?

Malware infection (adware or spyware)

200

What is spear phishing?

Targeted phishing aimed at a specific individual or group

200

What is NAT? (name and what it does)

Network Address Translation translates private IP addresses to public ones

200

What is an account lockout?

Locking an account after too many failed attempts

200

What is keylogging?

Recording keystrokes to steal data

200

Why should backups be stored offline?

To protect from ransomware

300

What does the CIA Triad stand for?

Confidentiality, Integrity, and Availability

300

What port is commonly used for FTP?

Port 21

300

What is an operating system?

Software that manages hardware and software resources

300

What is a DDos attack?

An attack that overwhelms a system with traffic using multiple machines

300

What should be done before installing unknown software?

Verify the source and scan it

400

What is the purpose of CyberSecurity policies?

To define rules and standards for protecting systems and data

400

What does DNS stand for?

Domain Name System

400

What is the principle of least privilege?

Users should have only the access they need

400

What is a zero-day vulnerability?

A vulnerability unknown to the vendor

400

Why is user training important for CyberSecurity?

Humans are a major security weakness

500

What is a Trojan Horse?

Malware disguised as Legitimate software

500

What is the difference between IPv4 and IPv6?

IPv6 has more addresses and better security

500

A Linux system hosts a shared service used by multiple users. During a security audit, you discover that several user accounts belong to groups granting write access to system-level configuration files. Describe two specific actions an administrator should take to correct this issue.

1. Remove users from privileged groups that allow system-level write access.

2. Restrict permissions on configuration files using proper ownership and file permissions

500

What is C2?

Communication between malware and attacker

500

What is the most important habit an entry-level cyber defender should have?

Staying cautious and security-aware