Cyber Security
Networking
Operating Systems & CLI
Name The Exploit
Applications
100

This type of hacker has access and permissions to check vulnerabilities on a system.

What is a white hat hacker?

100

This is a 32-bit address and the fourth version of IP, it is the basis of the Internet, and establishes the rules for the computer networks functioning on the principle of packet exchange.

What is IPv4?


100

A series of graphical operating systems developed and marketed by Apple Inc.

What is macOS?

100

This is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

What is a Denial-of-service (DoS) attack?

100

This is a a digital distribution platform developed by Valve Corporation for purchasing and playing video games. 

What is Steam?

200

Unauthorized use of legitimate identification and authentication data, however it was obtained, to mimic a subject different from the attacker. Impersonating, masquerading, piggybacking, and mimicking are forms of this

What is spoofing?

200

This IP address is used for loopback address and also for local testing purposes. 

What is 127.0.0.1?

200

A personal computer operating system produced by Microsoft as part of the Windows NT family of operating systems. It was released to manufacturing on August 24, 2001

What is Windows XP?

200

This is a type of computer security vulnerability typically found in web applications. This vulnerability enables attackers to inject client-side scripts into web pages viewed by other users.

What is a Cross-site scripting (XSS) attack?


200

This is a freeware and cross-platform messaging and Voice over IP service bought by Facebook. The application allows the sending of text messages and voice calls, as well as video calls, images and other media, documents, and user location.

What is WhatsApp

300

A type of email or malicious web site that solicits personal, often financial, information by pretending to be a a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem.

What is Phishing ?

300

225.225.225.0 Is the Subnet-mask for this CIDR Notation

What is a '/24'?

300

This is a script file in DOS, OS/2 and Microsoft Windows. It consists of a series of commands to be executed by the command-line interpreter, stored in a plain text file.

What is a Batch file?

300

This ransomware software spread through an exploit  developed by the US National Security Agency (NSA) for older Windows systems in May of 2017  with total damages ranging from hundreds of millions to billions of dollars.

What is WannaCry?

300

This is a commercial computer-aided design and drafting software application. Developed and marketed by Autodesk.

What is AutoCAD

400

A model designed to guide policies for information security within an organization and made up of Confidentiality, integrity and availability.

What is the CIA Triad. (Or  AIC triad)?

400

This is the field in an IPv4 packet header that typically stays the same during its transmission.

What is a Destination address?

400

This a commercial Unix operating system originally developed by Sun Microsystems. It superseded their earlier SunOS in 1993



What is Oracle Solaris?

400

This virus, popular in 2000, comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book and, perhaps more seriously, the loss of every JPEG, MP3, and certain other files on the recipient's hard disk 

What is the ILOVEYOU virus?

400

A open-source software used to discover hosts and services on a computer network by sending packets and analyzing the responses

What is NMAP.

500

A web application vulnerability in which the server does not check whether the request came from a trusted client or not.

What is a Cross Site Request Forgery (CSRF)?

500

A CISCO router command to display NVRAM contents.

What is "Show start/show start-config"

500

This is the command-line to set SELinux in enforcing mode.

What is 'setenforce enforcing'?

500

This exploit breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to this exploit

What is Spectre?

500

This a type-1 hypervisor, providing services that allow multiple computer operating systems to execute on the same computer hardware concurrently. It was developed by the University of Cambridge and is now being developed by the Linux Foundation with support from Intel.

Wheat is XEN?