Cyber Threats
Network Security
Passwords
Phishing
Wireless
100

This type of malware is designed to replicate itself and spread to other systems, often slowing down or crashing networks in the process.

What is a virus?

100

This basic security measure helps prevent unauthorized access to a network by requiring a username and password before granting access to system resources.

What is authentication?

100

This is a basic password policy practice where users are encouraged to create passwords that are difficult to guess by using a combination of uppercase, lowercase, numbers, and special characters.

What is password complexity?

100

This common type of phishing attack involves sending fraudulent emails that appear to be from reputable sources, attempting to trick recipients into providing sensitive information.

What is email phishing?

100

This type of wireless network, commonly used in homes and offices, operates on the 2.4 GHz and 5 GHz frequency bands, providing internet connectivity.

What is Wi-Fi?

200

This type of malware disguises itself as legitimate software, but once installed, it secretly tracks a user's actions and gathers sensitive data, often for malicious purposes.

What is spyware?

200

This security protocol is used to encrypt web traffic, ensuring data integrity and confidentiality between a user's browser and a website.

What is HTTPS?

200

This type of attack uses precomputed hash values for commonly used passwords to quickly crack password hashes without having to guess every possible combination.

What is a rainbow table attack?

200

This type of phishing attack involves cybercriminals creating nearly identical copies of legitimate websites to steal login credentials from unsuspecting users.

What is website spoofing?

200

This command-line tool is commonly used to crack wireless encryption protocols like WPA2 and WEP by performing brute-force attacks on captured handshake data.

What is Aircrack-ng?

300

A form of attack in which cybercriminals flood a network with traffic, overwhelming it and causing legitimate requests to be dropped, is known as this.

What is a DDoS (Distributed Denial of Service) attack?

300

This network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules, often placed at the edge of a network.

What is a firewall?

300

This technique involves storing passwords as irreversible hashes combined with a unique "salt" to protect them from being easily cracked, even if the password database is compromised.

What is salted hashing?

300

A phishing attack that uses phone calls or voice messages to trick individuals into revealing confidential information is known as this.

What is vishing?

300

These signals, transmitted from aircraft to ground stations, help pilots and air traffic controllers determine the plane's position and altitude in real-time.

What is ADS-B?

400

This sophisticated form of malware infiltrates a network through phishing or other means and then remains dormant for a long period, allowing attackers to exfiltrate sensitive information undetected.

What is a Trojan Horse (or Advanced Persistent Threat - APT)?

400

A type of attack where an attacker intercepts and potentially alters the communication between two parties, often by impersonating one of them, is known as this.

What is a man-in-the-middle (MITM) attack?

400

This advanced attack involves leveraging botnets to distribute password guessing attempts across multiple devices and IP addresses to avoid detection, often using a combination of proxy networks and rapid-fire brute force techniques.

What is a distributed brute force attack (or botnet-powered brute force attack)?

400

This type of phishing attack specifically targets high-profile individuals like executives or government officials, often using personalized and sophisticated tactics.

What is spear phishing?

400

This type of wireless technology is used in passive RFID systems to transmit data from a tag to a reader by using backscatter communication, where the tag reflects the radio waves instead of generating its own signal. It's a popular choice for asset management and inventory tracking.

What is UHF (Ultra High Frequency) RFID?

500

This highly targeted type of malware focuses on financial transactions and often goes unnoticed by traditional security measures, aiming to steal banking credentials and access accounts.

What is a banking Trojan?

500

A hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case. It replaces the need for stealing the plaintext password to gain access with stealing the hash.

What is a pass the hash?

500

A class of security exploit related to online services. They involve anticipating a user signing up for an online service and signing up to the service in their name, and then taking over their account when they attempt to register it themselves.[1][2][3] The attack relies on confusion between accounts created by federated identity services and accounts created using e-mail addresses and passwords, and the failure of services to resolve this confusion correctly.

What is Account pre-hijacking?

500

Attackers use this advanced phishing technique to compromise an entire organization's network by hijacking a trusted email thread and injecting malicious links or attachments.

What is conversation hijacking (or business email compromise - BEC)?

500

A technology in Wi-Fi 6, improves wireless network performance by establishing independently modulating subcarriers within frequencies. This approach allows simultaneous transmissions to and from multiple clients.

What is OFDMA (Orthogonal Frequency Division Multiple Access)?