Threats & Attacks
Network Security
Identity & Access Management
Cryptography
Security Operations
100

This type of attack floods a system with traffic to make it unavailable.

What is a DDoS attack?

100

This device filters traffic between networks based on rules.

What is a firewall?

100

A method of verifying a user’s identity with two or more factors.

What is multifactor authentication (MFA)?

100

The process of converting plaintext into unreadable data.

What is encryption?

100

A security tool that detects and alerts administrators of suspicious activity.

What is an IDS (Intrusion Detection System)?

200

A type of malware disguised as legitimate software.

What is a Trojan?

200

A secure protocol used to manage network devices remotely.

What is SSH?

200

The principle that users should only have the access they need.

What is least privilege?

200

The algorithm used in WPA2 for wireless encryption.

What is AES?

200

The process of evaluating risks and determining how to manage them.

What is risk assessment?

300

This attack tricks users into revealing confidential information by pretending to be a trusted source.

What is phishing?

300

VLANs are used to do this in network environments.

What is segment traffic?

300

This authentication protocol uses tickets and is common in Windows environments.

What is Kerberos?

300

This cryptographic method uses one key to encrypt and a different one to decrypt.

What is asymmetric encryption?

300

This plan ensures business functions can continue during and after a disruption.

What is a business continuity plan (BCP)?

400

A vulnerability that is unknown to the vendor and has no patch available yet.

What is a zero-day exploit?

400

This tool captures and analyzes network traffic.

What is a packet sniffer (e.g., Wireshark)?

400

A central system for managing user credentials and access rights.

What is identity provider (IdP)?

400

A digital fingerprint used to verify data integrity.

What is a hash?

400

Logs and alerts are centralized in this type of system.

What is a SIEM?

500

This attack intercepts and potentially alters communication between two parties.

What is a man-in-the-middle (MitM) attack?

500

This port is used by HTTPS.

What is port 443?

500

This form of access control bases decisions on roles or job functions.

What is role-based access control (RBAC)?

500

This public-key algorithm is widely used for secure data transmission.

What is RSA?

500

The process of identifying and fixing weaknesses in systems.

What is vulnerability management?