Malware
Threat Actors
Attacks
Vulnerabilities
Kali Commands
100

Malicious code that attaches to a file or document.

What is a virus?

100

Individuals who abuse their authorization to execute an attack, typically for revenge.

What is an insider threat?

100

Encrypts a user's data and demands payment to restore access.

What is ransomware?

100

When something is not being updated anymore, it is more prone to attacks.

What is outdated software?

100

A computer that runs without a physical host machine. Used in our labs.

What is a virtual machine?

200

A virus that security monitors a user's behavior.

What is spyware?

200

Individuals who execute a cyber attack to protest something.

Who are hactivists?

200

A type of virus that disguises itself as a normal file.

What is a Trojan>

200

A shortcut that bypasses security protocols.

What is a backdoor?

200

Changes the current directory.

What does the cd command do?

300

Allows a malicious hacker to gain unauthorized administrative access while hiding their presence. 

What is a rootkit?

300
Inexperienced hackers who use others' tools to launch attacks.

Who are script kiddies?

300

This is a Trojan that can be accessed remotely.

What is a RAT?

300

A vulnerability that the developers are unaware of.

What is a zero-day vulnerability? 

300

Lists the files in the directory.

What does the ls command do?

400

A network of infected computers controlled by a central attacker.

What is a botnet?

400

State-sponsored hackers that are motivated by politics.

What are nation-state actors?

400

Disrupts a server by overwhelming it with traffic, causing it to shut down.

What is a DDoS?

400

Allows the user to enter anything they want into the search bar.

What is a SQL injection?

400

Makes a new folder.

What does the mkdir command do?

500

This type of malware is self-replicating and spreads without user intervention.

What is a worm?

500

Hackers who use exploits to continue their criminal behavior and maintain power/control. 

What is organized crime?

500

Attackers impersonate someone to try to get sensitive information from a user.

What is phishing?

500

Data breaches, insecure APIs, shared technology issues, poor network security, etc., are examples of this. 

What are cloud vulnerabilities?

500

Displays the contents of a file.

What does the cat command do?