Information
Attack & Threats
IT Best Practices
Security Culture
I'm so Smart
100

Confidentiality, Integrity, and Availability.

What are the three pillars of cybersecurity?

100

Malicious software designated to damage, disrupt, or gain unauthorized access to systems.

What is malware?

100

The practice of keeping systems updated to fix vulnerabilities.

What is patch management?

100

Report immediatly using the designated button; report it to GSOC or your local Security team.

 What should you do if you receive a phishing email?

100

The 2017 global ransomware attack that affected hospitals and companies via a Windows vulnerability.

What was WannaCry?

200

A type of attack that tricks users into revealing credentials via fake emails or messages.

What is phishing?

200

An attack where an attacker gains higher access rights than originally granted.

What is privilege escalation?

200

The plans to maintain (or recover) the service online in case of disaster, interruption, or malfunction.

What are Service Continuity Plan (SCP) & Disaster Recovery Plan (DRP)?

200

A document outlining what to do when a security incident occurs.

What is an Incident Response Plan?

200

The formal process of ensuring that employees follow security policies and regulatory requirements.

What is compliance?

300

An authentication method requiring two or more different verification factors.

What is Multi-Factor Authentication (MFA)?

300

An attack where an adversary secretly intercepts communication between two parties.

What is a Man-in-the-Middle (MitM) attack?

300

A copy of data used to restore information after loss or attack.

What is a backup?

300

Regular training to help recognize phishing emails and social engineering attempts.

What is security awareness training?

300

Simulating controlled attacks to identify vulnerabilities before real attackers do.

What is penetration testing (pentesting)?

400

The process of converting information into an unreadable format to protect it.

What is encryption?

400

A method of systematically trying many password combinations until the correct one is found.

What is a brute-force attack?

400

This tool securely stores passwords so users don't have to writte them down in plain text files.

What is password manager?

400

The process of identifying, evaluating, and prioritizing security risks.

What is risk management?

400

A widely used framework to improve organizational cybersecurity posture.

What is the NIST Cybersecurity Framework?

500

In risk management, it describes potential damage or loss to the organization if a threat exploits a vulnerability.

What is risk impact?

500

An attack that injects malicious code into a web application's input fields to manipulate a database.

What is SQL injection?

500

A set of policies, controls, and guidelines designed to protect organizational information.

What is an Information Security Management System (ISMS)? / What is Security posture?

500

Dividing a network to limit lateral movement of attackers.

What is network segmentation?

500

End users.

What is the first line of defense in a cyber attack?