Threats/Attacks
Security Principles
Tools & Technology
Cryptography
Cybersecurity Practices
100

This type of attack floods a network with traffic to make it unavailable.

What is a DDoS attack?

100

The “C” in the CIA triad.

What is confidentiality?

100

A device or software that monitors and controls incoming/outgoing network traffic.

What is a firewall?

100

The process of converting plain text into coded text.

What is encryption?

100

A strong password should include letters, numbers, and this.

What are special characters?

200

This attack tricks users into revealing sensitive info through fake emails or websites.

What is phishing?

200

Ensuring data is accurate and not altered.

What is integrity?

200

Software designed to detect and remove malicious programs.

What is antivirus software?

200

The process of converting coded text back to readable form.

What is decryption?

200

Updating software regularly helps fix these.

What are vulnerabilities?

300

Malware that locks your files until payment is made.

What is ransomware?

300

Making sure systems and data are accessible when needed.

What is availability?

300

A secure connection over the internet often used for remote work.

What is a VPN?

300

A one-way function used to verify data integrity.

What is hashing?

300

Backups help recover data after this type of attack.

What is ransomware?

400

An attack where someone secretly intercepts communication between two parties.

What is a man-in-the-middle attack?

400

Verifying a user’s identity.

What is authentication?

400

This tool scans systems for known vulnerabilities.

What is a vulnerability scanner?

400

Encryption using two keys: public and private.

What is asymmetric encryption?

400

This method requires two forms of verification.

What is two-factor authentication (2FA)?

500

This exploit targets databases using malicious queries.

What is SQL injection?

500

Granting access based on permissions.

What is authorization?

500

A system that detects suspicious network activity.

What is an IDS (Intrusion Detection System)?

500

A widely used secure protocol for websites (HTTPS).

What is SSL/TLS?

500

The principle of giving users only the access they need.

What is least privilege?