Cybersecurity History
Tools & Commands
Authentication & Authorization
Cyber Threat Actors
Wireless & Mobile Security
100

The infamous 2013 data breach exposed over 3 billion accounts.

What is the Yahoo breach

100

Linux command used to display network interfaces.

What is ifconfig or ip a?

100

Security questions are an example of this authentication factor type.

What is knowledge-based authentication?

100

A threat actor hired by a company to simulate real attacks.

What is a red teamer?

100

This mobile feature isolates apps from accessing each other’s data.

What is sandboxing?

200

The worm that spread via USB drives in Iran’s nuclear facilities.

What is Stuxnet?

200

Tool used to crack Wi-Fi passwords.

What is Aircrack-ng?

200

A method where a system confirms that a login attempt comes from a legitimate device.

What is device-based authentication?

200

A nation-state cyber threat actor is often referred to as this.

What is a state-sponsored actor?

200

A common way attackers infect phones through text messages.

What is smishing?

300

This company suffered a breach in 2017 exposing sensitive credit data.

What is Equifax?

300

Tool used to generate and manage SSL certificates.

What is OpenSSL?

300

This access control model assigns permissions based on clearance levels.

What is Mandatory Access Control (MAC)?

300

An individual who exploits systems with no defined motive.

What is a script kiddie?

300

Mobile Device Management (MDM) is used for this.

What is securing, monitoring, and managing mobile devices?

400

Created the first antivirus software company.

Who is John McAfee?

400

Used to simulate brute-force attacks on login pages.

What is Hydra?

400

JSON-based token used to securely transmit claims between parties.

What is a JWT (JSON Web Token)?

400

This group often targets critical infrastructure with advanced malware.

What is a nation-state APT?

400

This type of wireless attack captures Wi-Fi handshakes for offline cracking.

What is a handshake capture attack?

500

The original purpose of the “Creeper” virus was to do this.

What is test computer self-replication?

500

This tool is used to detect and prevent intrusions in real-time.

What is Snort or Suricata?

500

Open standard for decentralized authentication, used by major platforms.

What is OAuth 2.0?

500

These attackers demand money to unlock or not leak data.

What are ransomware operators?

500

This protocol improves upon WPA2 by offering stronger encryption and forward secrecy.

What is WPA3?