Encrypt Yo' Self
Hacker's Worst Nightmare
CIA but not that CIA
Password Puzzles
Phishy Business
100

This type of encryption uses the same key for both encryption and decryption

What is symmetric encryption?

100

This type of software monitors and restricts incoming and outgoing network traffic based on security rules.

What is a firewall?

100

The "C" in the CIA triad stands for this, ensuring that data is only accessible by authorized users.

What is confidentiality?

100

This term describes a password that contains letters, numbers, and special characters to increase security.

What is a strong password?

100

This type of attack involves tricking people into giving up sensitive information by pretending to be a trustworthy entity.

What is phishing?

200

A type of encryption where each letter in the plaintext is shifted by a certain number of places down or up the alphabet.

What is the Caesar cipher?

200

A security feature that adds an extra layer of protection by requiring a second form of identification beyond just a password.

What is multi-factor authentication (MFA)?

200

This aspect of the CIA triad ensures that data is accurate and has not been tampered with

What is integrity?

200

This attack method involves trying every possible combination of characters until the correct password is found.

What is a brute force attack?

200

This more targeted form of phishing often involves personalized information to increase the attack’s success.

What is spear phishing?

300

This widely-used encryption protocol secures communication over the internet, particularly with HTTPS.

What is TLS (Transport Layer Security)?

300

This type of software detects and removes malicious software from your computer.

What is antivirus software?

300

The "A" in the CIA triad stands for this, ensuring that systems and data are accessible when needed.

What is availability?

300

A common recommendation for passwords is to use at least this many characters

What is 12 characters?

300

In this type of phishing attack, the attacker pretends to be a high-ranking official to exploit employees.

What is whaling?

400

In this process, plaintext is converted into an unreadable format to protect sensitive data.

What is encryption?

400

A feature that keeps a secure copy of your data so you can restore it if it's lost or corrupted.

What is a backup?

400

Ensuring that a person is who they claim to be is critical for maintaining this aspect of the CIA triad.

What is confidentiality?

400

This type of password attack uses a precomputed list of potential passwords to quickly find matches.

What is a dictionary attack?

400

The term for phishing attempts that occur over text messages.

What is smishing?

500

This type of encryption uses two keys—one public and one private.

What is asymmetric encryption?

500

The security principle that suggests users should have the minimum level of access necessary to perform their duties.

What is the principle of least privilege?

500

This process, often part of the integrity principle, involves confirming that data has not been altered.

What is data validation?

500

This term refers to the practice of using the same password across multiple sites, increasing risk

What is password reuse?

500

This type of phishing attack involves creating a fake website that looks like a legitimate one to steal credentials.

What is a phishing website (or spoofing)?