Access Control & Authentication
Networking & Internet Basics
Security Threats & Defenses
Hardware & System Components
Encryption, Testing & Web Security
100

This access control model assigns permissions based on job roles.

What is RBAC?

100

This protocol automatically assigns IP addresses to devices.

What is DHCP?

100

This attack overwhelms a system with traffic from multiple sources.

What is a DDoS attack?

100

This is the “brain” of the computer.

What is the CPU?

100

This symmetric encryption standard is widely used to secure data.

What is AES?

200

This model uses attributes like location, time, or device to determine access.


What is ABAC?

200

This system translates domain names into IP addresses.

What is DNS?

200

This attack tricks users into performing unwanted actions on a website.

What is CSRF?

200

This storage device uses spinning disks.

What is an HDD?

200

This asymmetric encryption algorithm is named after its three creators.

What is RSA?

300

This model allows the owner of a resource to decide who gets access.


What is DAC?

300

This company provides access to the internet.

What is an ISP?

300

This attack secretly intercepts and alters communication between two parties

What is a MITM attack?

300

This modern firmware replaces BIOS and offers more features and security.

What is UEFI?

300

This testing method scans source code for vulnerabilities.

What is SAST?

400

This model is used in high‑security environments and relies on strict system‑enforced labels.


What is MAC?

400

This protocol is used for transferring files between a client and server.

What is FTP?

400

This long‑term, stealthy attack steals data while remaining undetected.

What is an APT?

400

This component converts wall power into usable electricity for the computer.

What is the PSU?

400

This testing method checks running applications for vulnerabilities.

What is DAST?

500

This framework ensures only the right individuals have access to specific resources.

What is IAM?

500

This technology delivers voice communication over the internet.

What is VoIP?

500

This acronym refers to attacker behavior patterns: tactics, techniques, and procedures.

What is TTP?



500

This component handles graphics rendering and is used heavily in AI computing.

What is the GPU?

500

This attack injects malicious scripts into web pages.

What is XSS?