Network Security Protocols
Types of Malware
Social Engineering Techniques
Encryption Basics
Authentication Methods
100

What protocol is used to secure websites via HTTPS?

TLS (Transport Layer Security)

100

What type of malware demands payment to unlock data?

Ransomware

100

What is phishing?

A scam to steal information via fake emails or websites

100

What is encryption?

Converting data into a secret code

100

What is two-factor authentication (2FA)?

Two steps to verify identity

200

What is the purpose of a firewall?

To block unauthorized access

200

What does a worm do?

Spreads itself across networks

200

What is pretexting in cybersecurity?

Creating a false scenario to steal data

200

What is a cipher?

A method of encrypting text

200

What is biometric authentication?

Using physical traits like fingerprint or face

300

What does a VPN do?

Encrypts your internet connection

300

What malware records keystrokes?

Keylogger

300

What is baiting?

Offering something enticing to trick the victim

300

What does a public key do?

Encrypts data

300

What is a password manager?

A tool to store and generate passwords

400

What is the function of a proxy server?

Acts as a gateway between a user and the internet

400

What’s a botnet?

A network of infected computers controlled remotely

400

What is the goal of social engineering?

To manipulate people into giving up confidential information

400

What is end-to-end encryption?

Only sender and receiver can read the message

400

What is MFA?

Multi-Factor Authentication

500

Which protocol is used for securely transferring files?

SFTP (Secure File Transfer Protocol)

500

What is adware?

Malware that displays unwanted ads

500

What’s spear phishing?

A targeted phishing attack at a specific person

500

What’s the difference between symmetric and asymmetric encryption?

Symmetric uses one key; asymmetric uses two

500

What is CAPTCHA used for?

To verify a human is using the system