Miscellaneous
News / Entertainment
Authentication / Authorization
Red Team
Types of Attacks
100

Also called a “jump box” or “jump server,” what kind of host is used to manage remote access to a private network from an external one (e.g., for authorized users connecting through the Internet)

What is Bastion?

100

Besides being an actual witch, this "Buffy the Vampire Slayer" character played by Alyson Hannigan was also a skilled computer hacker

Who is Willow?

100

According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, the most common six-letter "word" that is used for passwords that don't require numbers or punctuation

What is Qwerty?

100

An exploit payload is sometimes called by what other name that makes it sound like something a beach-bum hacker would spot on the sand

What is shellcode?

100

A two-word term is given to malicious or misleading data from a remote name server is saved by another name server

What is cache poisoning?

200

This University initially maintained the text file named HOSTS.TXT that mapped host names to the numerical addresses of computers on the ARPANET

What is Stanford?

200

With the first name Peter, this programmer released a series of computer utilities in 1982, which included Unerase, a utility to find deleted files? His name is well known in anti-virus software

Who is Norton?

200

This technology ensures that email messages are signed with a digital signature to verify the sender's identity and ensure the message's integrity.

What is DomainKeys Identified Mail aka DKIM?

200

An automated software testing method that injects invalid, malformed, or unexpected inputs into a system to reveal software defects and vulnerabilities

What is fuzzer?

200

Term is given to a malicious technique by which a victim is tricked into clicking on a URL, button or other screen object other than that intended by or perceived by the user

What is clickjacking?

300

The two-word ursine name of the Russian cyber espionage group, also known as APT28, thought to be operating since the 2000s

What is Fancy Bear?

300

Google’s reCAPTCHA protects websites from getting spammed by making users complete a visual task. It’s an example of which famous test to tell humans from machines

What is the Turing test?

300

This protocol is widely used for secure, federated identity management, allowing users to authenticate with one system and gain access to others without re-entering credentials

What is SAML?

300

This term is used to describe the “cargo” that malware brings with it when it infects a device?

What is payload?

300

This type of “poisoning” technique involves hackers inserting malicious links into websites that are engineered to rank high on Google, thereby tricking people into clicking them when they search for something

What is SEO?

400

This cybersecurity architecture / model  states that a network is always at risk from outside and inside threats, that every user should be verified every time, and that users should only have as much access as they need

What is ZeroTrust?

400

This 2016 attack exposed the personal information of over 500 million users of this Internet company

What is Yahoo?

400

This authentication protocol allows users to securely access multiple applications or services using a single set of credentials, often through integration with identity providers.

What is SSO?

400

Use of a valid session key to gain unauthorized access for the information or services residing on a computer system

What is session hijacking?

400

You might recognize this type of attack if you are a fan of Discovery or National Geographic channels , inserting malware into a frequently visited site.

What is a watering hole attack?

500

This infamous hacking group was responsible for a series of high-profile attacks, including the 2014 Sony Pictures hack

Who is the Lazarus Group?

500

This former NSA contractor leaked classified documents revealing extensive government surveillance programs to the media in 2013

Who is Snowden?

500

Why did the scarecrow become a cybersecurity expert?

Because he was outstanding in his field!

500

This term describes DNS queries and responses used to bypass traditional security measures

What is DNS tunneling?

500

An all-out cyberwarfare attack that performs a three-stage systematic attack on a nation's computer infrastructure.  It is called this because "Everything must go"

What is a fire sale?