Malware 1
Malware 2
Random 1
Random 2
Random 3
100

Your computer is currently displaying a window demanding payment to unlock your computer, and you cannot exit the window. What type of malware is on your computer?

What is Ransomware?

100

Worms often use this to spread.

What is a network?

100

Minh liked studying math and statistics in college and wants to go into a cybersecurity job. He should become a _____

Cryptographer

100

This type of hacker normally has a security job by day, but hacks illegally during their own time.

What is a Grey Hat hacker?

100

Your internet is fine, but you cannot connect to one specific website. The website may be suffering from this kind of attack.

What is a DoS or DDoS attack?

200

This is often used by spyware to capture what you type.

What is a Keylogger?

200

You download a flashlight app on your phone, and within minutes you get spammed by ad notifications. The app is an example of this type of malware.

What is a Trojan and/or Adware.

200

As you browsing the internet, you start getting pop ups from within your browser alerting you that you have been infected with a virus. These pop ups are an example of this kind of Social Engineering attack.

What is Scareware?

200

This is a method of listening to a victim's voicemail without using their phone.

What is Spoofing?

200

Julie found a bug in a database program that could give her unauthorized access to employee information. This is a(n)

Exploit

300

WannaCry is an example of this type of malware. 

What is Ransomware?

300

This type of malware does not need any human interaction for it to self-replicate.

What is a Worm?

300

While working at the office, you happen to see a coworker badge into the building, but before the door can fully shut, an unknown person catches the door and lets himself in. You just witnessed what type of Social Engineering attack?

What is Tailgating?

300

Security engineers must continuously update their skills and knowledge on the following system.

UNIX/Windows

300

You go to your local coffee shop but do not have a signal, so you decide to connect to the shop's WiFi to check your bank balance. Later that week, your bank account has been emptied. You were probably a victim of this type of cyber attack.

What is a Man in the Middle attack?

400

This type of malware depends on a host application to be running for it to work.

What is a Virus?

400

The main issue with this type of malware, besides being annoying, is the erosion of the victim's privacy.

What is Adware?

400

Fred was able to follow a network engineer into the server room by following him closely as he opened and closed the doors. 

Social Engineering

400

This tool is an open source intelligence and forensics application used for the mining and gathering of information, as well as displaying this information in an easy to understand format.

What is Maltego?

400

You are doing some research for a homework assignment and visit a lot of new websites that bombard you with ads. In the next few days, you notice your computer is slowing down a lot. You were probably a victim of this type of cyber attack.

What is a Drive-By attack?

500

This type of malware is difficult to spot, but it can easily slow down your internet/network connection.

What is a Worm or Bot?

500

This type of malware gives an attack Root/Administrative privileges on the victim's computer.

What is a Rootkit?

500

You are approached by a friendly stranger who strikes up an innocent conversation with you. This conversation quickly turns personal, but the stranger always answers his own questions first. The stranger may be attempting this kind of Social Engineering attack.

What is a Quid Pro Quo attack?

500

George made a fake banking link where, if the victim clicks on it and logs in with their information, gives him their account information.

Data Theft

500

You are attempting to crack some password hashes. You have attempted to use a Rainbow Table, but are getting no matches even though you know that one of the passwords is 123. These hashes have gone through this kind of process.

What is Salt or Salting process?