Basics
Cybersecurity terms
Cybersecurity practices
Cybersecurity tools and technologies
Advanced Cybersecurity Concepts
100

What software detects and prevents malicious malware on your devices

What is An Antivirus software

100

This word refers to the use of deception to trick people into revealing confidential information

What is Social Engineering?

100

Enabling this on accounts adds an extra layer of security by requiring a code in addition to a password.

What is Two factor authentication?
100

This technology is used to create a secure and encrypted connection over a less secure network, such as the internet.

What is a VPN?

100

This algorithm is used to convert readable data into unreadable data to protect it during transmission.

What is encryption

200

Attempt to get sensitive information by disguising yourself as a trustworthy entity in email communication 

What is Phishing

200

A security system that monitors and controls incoming and outgoing network traffic

What is a firewall?
200

This practice involves regularly creating copies of data to protect against loss or corruption.

What is backing up data?
200

This software is designed to protect your device from malware by monitoring and analyzing system behavior in real time.

What is anti-malware software?

200

The term for a unique identifier assigned to a device on a network.

What is an IP address

300

What does each letter in C-I-A triad stand for

Confidentiality

Integrity

Availability

300

The practice of protecting internet-connected networks devices and data from cyberattacks 

What is cybersecurity 

300

The process of  fixing security vulnerabilities on your computer known as this

What is patching?

300

This software tool is commonly used to securely connect to linux servers

What is the ssh?

300

A network of networks

What is the INTERNET

400

A common security measure that uses at least eight characters, mixing letters, numbers, and symbols for better protection

What is a strong Password

400

This type of attack overloads a network or server with traffic, making it unavailable to users.

What is DDoS (Distributed Denial-of-Service) attack ?

400

This policy limits users' access rights to only what is necessary for their roles

What is the principle of least privilege

400

This tool helps manage and generate complex passwords securely for different accounts.

What is a password manager?

400

This type of cybersecurity testing simulates a real-world cyber attack to find vulnerabilities.

What is penetration testing?

500

A type of malware that encrypts the victim's files, demanding payment for decryption

What is Ransomware?
500

This type of vulnerability that is unknown to the software authors and is known to hackers.

What is a ZERO day

500

This is the process of analyzing and identifying potential security threats in a system.

What is Threat assessment

500

This type of system not only detects threats in real-time but can also respond automatically to stop or mitigate an attack.

What is an intrusion prevention system (IPS)

500

This is the term for a modern day encryption used on the internet to secure web traffic

What is PKI