Malware
Social Engineering
Windows Server
Networking Fundamentals
ML/AI
100

This type of malware locks files or systems and demands payment,often in cryptocurrency,for their release.

What is ransomware?

100

This classic social engineering attack tricks victims into revealing information by pretending to be a trusted person over email.

What is phishing?

100

This Windows Server role manages user accounts, computers, group policies, and authentication across a domain.

What is Active Directory Domain Services (AD DS)?

100

This device connects multiple network segments and makes forwarding decisions based on IP addresses.

What is a router?

100

This type of learning trains a model using labeled data to classify or predict outcomes.

What is supervised learning?

200

Often hidden inside legitimate-looking software, this malware gives attackers remote control over a victim’s system.

 What is a Remote Access Trojan (RAT)?

200

This high-pressure technique relies on creating a false sense of urgency like claiming an account will be closed immediately to get someone to act quickly.

 What is urgency or pretexting with urgency?

200

This command-line tool is used to test network connectivity and name resolution issues on a Windows Server by checking DNS entries.

What is nslookup?

200

This protocol uses port 53 and is responsible for translating domain names into IP addresses.

What is DNS?

200

This algorithm finds the best line that separates data into different classes by maximizing the margin.

What is a Support Vector Machine (SVM)?

300

This self-replicating threat spreads across networks without needing to attach itself to a host file, unlike viruses.

What is a worm?

300

This form of social engineering uses phone calls, often pretending to be tech support or a bank representative.

What is vishing?

300

This Windows Server feature automatically deploys OS images over the network to new machines.

What is Windows Deployment Services (WDS)?

300

This network model layer is responsible for end-to-end communication, error recovery, and segmentation in the OSI model.

What is the Transport layer?

300

This neural network layer type is commonly used in image recognition tasks to detect patterns like edges and shapes.

What is a convolutional layer?

400

A type of malware often delivered through phishing emails, designed to capture keystrokes, screenshots, or login credentials.

What is spyware?

400

This attack targets high-value individuals such as executives or administrators with highly personalized fraudulent messages.

 What is spear phishing?

400

This protocol, configured in Windows Server, automatically assigns IP addresses to devices on a network.

 What is DHCP?

400

This type of IP address is assigned manually and does not change unless edited by an administrator.

What is a static IP address?

400

This metric measures how far predicted values are from actual values, often used in regression models.

 What is mean squared error (MSE)?

500

This stealthy malware stays hidden by modifying operating system processes, making it difficult to detect or remove.

What is a rootkit?

500

In this technique, an attacker follows someone into a restricted area by walking closely behind them and relying on politeness.

What is tailgating?

500

This type of Windows Server failover technology allows services to continue running on another node if one server fails.

What is Failover Clustering?

500

This tool sends echo requests to test network connectivity and report packet loss or latency.

What is ping?

500

This AI concept refers to models that generate new content like text, images, or audio based on learned patterns.

What is generative AI?