Malware
Network Security
Social Engineering
Encryption
Authentication
100

What type of malware demands payment to restore access to files?

Ransomware

100

What does HTTPS stand for?

Hypertext Transfer Protocol Secure

100

What is phishing?

A technique to trick users into revealing personal info via fake emails or websites

100

What does encryption do to data?

Converts it into unreadable form to protect it

100

What does MFA stand for?

Multi-Factor Authentication

200

Which malware records keystrokes to steal passwords?

Keylogger

200

Which protocol secures email communication?

Secure/Multipurpose Internet Mail Extensions (S/MIME)

200

What is shoulder surfing?

Observing someone’s screen or keyboard to steal credentials

200

What is the process of converting ciphertext back to plaintext?

Decryption

200

What is a biometric authentication method?

Fingerprint, face recognition, or retina scan

300

What is the name of a self-replicating malware that spreads without user action?

Worm

300

What is the function of a firewall?

To filter and block unauthorized network traffic

300

What is baiting?

Leaving a tempting item (like a USB drive) to lure someone into compromising security

300

What encryption method uses the same key to encrypt and decrypt?

Symmetric encryption

300

What is a token-based authentication method?

A temporary code or device used to verify identity

400

Which type of malware disguises itself as legitimate software?

Trojan Horse

400

What protocol is used to securely access a remote computer?

SSH (Secure Shell)

400

What type of attack targets a specific person using personalized information?

Spear phishing

400

Which encryption method uses a public and private key pair?

Asymmetric encryption

400

What is the difference between authentication and authorization?

Authentication verifies identity; authorization grants access

500

What do we call malware that gives an attacker remote control of a system?

Remote Access Trojan (RAT)

500

Which network protocol uses encryption and operates at Layer 3?

IPsec

500

What is pretexting? 

Creating a fabricated scenario to trick someone into revealing information

500

What is the main advantage of asymmetric encryption over symmetric?

It doesn’t require secure key exchange

500

What is single sign-on (SSO)?

A system allowing one login to access multiple applications