Cyber Threats
Security Measures
Data Protection
Human Trickery
Network Security
100

This type of cyber threat involves unauthorized access to a computer or network.

What is hacking?

100

What is the term for the process of verifying a user's identity?

What is authentication?

100

This is the process of converting data into an unreadable form to prevent unauthorized access.

What is encryption?

100

What is the term for the manipulation of individuals to divulge confidential information?

What is social engineering?

100

What is the first line of defense against unauthorized access to a network?

What is a firewall?

200

These malicious programs disguise themselves as legitimate software but carry out harmful actions.

What are trojans?

200

Enabling this feature on your smartphone helps protect it from unauthorized access. HINT It is unique to every individual

What is biometric authentication?

200

This policy specifies how long data should be retained and when it should be securely disposed of.

What is a data retention policy?

200

This social engineering attack involves creating a sense of urgency to prompt immediate action.

What is pretexting?

200

This security measure assigns unique identifiers to devices on a network to control their access.

What is MAC address filtering?

300

A distributed denial-of-service (DDoS) attack aims to disrupt a target's services by flooding it with what?

What is a massive volume of traffic?

300

VPN stands for what, which creates a secure connection over the internet?

What is Virtual Private Network?

300

What is the term for the process of removing data irreversibly so that it cannot be recovered?

What is data sanitization?

300

What is the term for a social engineering attack where an attacker masquerades as a legitimate entity?

What is impersonation?

300

This type of attack involves intercepting and altering communication between two parties.

What is a man-in-the-middle attack?

400

This type of cyber attack involves exploiting vulnerabilities in a system to gain unauthorized access or steal data.

What is exploitation?

400

What does a UTM appliance typically combine to provide comprehensive security for a network?

What is firewall, antivirus, intrusion detection, and content filtering?

400

What is the term for a technique used to validate the integrity and authenticity of a message?

What is a digital signature?

400

What is the psychological manipulation that exploits human behavior to bypass security measures?

What is a manipulation technique?

400

What is the term for the process of inspecting and filtering incoming and outgoing network traffic?

What is packet filtering?

500

In a zero-day exploit, attackers target vulnerabilities that are known to whom but not yet patched?

What is the software vendor?

500

What is the term for the practice of hiding sensitive information within less sensitive information?

What is steganography?

500

What is the cryptographic technique that ensures the authenticity and integrity of transmitted data?

What is HMAC (Hash-based Message Authentication Code)?

500

What is the term for a social engineering technique that involves gaining unauthorized access by exploiting human trust?

What is pretexting?

500

What is the cryptographic protocol that provides secure communication over a computer network?

What is SSL/TLS (Secure Sockets Layer/Transport Layer Security)?