Basics
Types
Attackers & Motivation
Measures
Incidents
100

What does the "C" in the CIA triad stand for?

Confidentiality

100

What does DoS stand for?

Denial of Service

100

Gaining higher-level access without permission

An unskilled hacker using others’ tools

100

What does a firewall do?

Blocks unauthorized access

100

What is unauthorized access?

Access without permission

200

What is cyber security?

Protecting computers, networks, and data

200

What is phishing?

Tricking people into giving personal data

200

What motivates a hacktivist?

Social or political goals

200

What is penetration testing?

Testing a system for weaknesses

200

What is data theft?

Stealing information

300

What are the three parts of the CIA triad?

Confidentiality, Integrity, Availability

300

What is malware?

Malicious software

300

Who is an insider attacker?

Someone inside an organization

300

What is encryption?

Scrambling data to protect it

300

What happens during a DoS attack?

A system is overloaded

400

What is the purpose of the CIA triad?

To ensure data is secure, accurate, and accessible

400

What is a botnet?

A network of infected computers

400

What does a vulnerability broker sell?

Security flaws

400

What is the purpose of anti-malware software?

Detect and remove harmful software

400

What is information disclosure?

Sharing private data

500

What is integrity in the CIA triad?

Ensuring data is accurate and trustworthy

500

What is an escalation of privileges attack?

Gaining higher-level access without permission

500

What is one motivation for a state-sponsored attacker?

Spying

500

What is patch management?

Updating software to fix security issues

500

What is one way to prevent data loss?

Regular backups