Security Fundamentals
Attack Methods
Cryptography Concepts
Network Security
Security Policies
100

When personal information like Social Security numbers or credit card data is exposed through a security breach, this type of information is classified by what three-letter acronym that stands for Personally Identifiable Information?


PII


100

Cybercriminals often create fake websites or emails that appear legitimate to trick users into revealing passwords or personal information. This deceptive technique, named after a type of fishing, is called what?

Phishing

100

In basic cryptography, the original readable message before it's converted into secret code is called plaintext, while the scrambled, unreadable version is called what?

Ciphertext

100

Network administrators install security devices that monitor incoming and outgoing traffic and block unauthorized access based on predetermined rules. These network barriers are called what?



Firewalls

100

What are the steps you should take if you think your computer has been infected with malware?

Close the window, exit the browser, run antivirus software, and check for updates

200


A security approach that requires users to verify their identity using two or more independent factors, such as a password and a one-time code.

What is multi-factor authentication (MFA)?

200

Attackers sometimes flood a network or server with an overwhelming amount of traffic to make it unavailable to legitimate users. This type of attack that aims to deny service is abbreviated as what?



DoS

200

Modern secure communications rely on encryption systems where two different but mathematically related keys are used - one for encryption and another for decryption. This cryptographic approach is called what type of key cryptography?



Public key

200

To protect sensitive data traveling over public networks like the Internet, organizations create encrypted tunnels that allow secure remote access to private networks. These secure connections are abbreviated as what?



VPN

200

What tools can be used to prevent malware from entering your computer?

Antivirus software, firewall protection, and Windows SmartScreen

300

Security professionals often refer to the three core principles that form the foundation of information security: ensuring data accuracy, preventing unauthorized access, and maintaining system availability. What acronym represents these three principles?



CIA


300

Malicious software that appears to be legitimate but actually contains hidden harmful code, named after a famous military deception from ancient Greece, is called what?



Trojan


300

To ensure data hasn't been tampered with during transmission, cryptographic systems generate a unique digital fingerprint of the original message. This verification mechanism is called a what?



Hash

300

A system that monitors and filters incoming and outgoing network traffic based on predetermined security rules.

What is a firewall?

300

What happens when a file has a double file extension?

The file will function based on the last extension listed.

400

The practice of giving users only the minimum level of access necessary to perform their job functions.

What is the principle of least privilege?

400

In this sophisticated attack method, cybercriminals position themselves between two communicating parties to intercept and potentially alter communications without either party knowing. What is this interception technique called?



Man in the middle

400

The current standard for symmetric encryption, adopted by the U.S. government in 2001 to replace DES, uses 128-bit, 192-bit, or 256-bit keys and is known by what three-letter acronym?

AES

400

When wireless networks broadcast their presence, they identify themselves with a name that users see when searching for available WiFi connections. This network identifier is called what?



SSID

400

How can a user verify if a file has a double file extension?

By right-clicking the file and opening it with edit to view the extensions

500

Advanced persistent threats represent sophisticated, long-term cyberattacks typically sponsored by nation-states or organized crime groups that silently infiltrate networks for extended periods. These complex attacks are commonly abbreviated as what?

APT


500

When attackers exploit vulnerabilities that software developers haven't yet discovered or patched, they're using what type of exploit that refers to the number of days developers have had to create a fix?



Zero day
500

In quantum cryptography research, scientists worry that future quantum computers could break current encryption methods by efficiently solving the mathematical problems that make today's cryptography secure. This potential threat is called quantum what?



Supremacy

500

What is a method used to secure data transmission and reduce the risk of interception on unsecured networks?

Encrypting data in transit using protocols like HTTPS or TLS to prevent interception on public networks.

500

What is one of the first actions you should take after suspecting malware infection?

Running antivirus software.