Threats
Attacks\Cyber
Vulnerabilities
Malware
Potpourri
Attacks\Physical
100

Someone follows you through a secure door without authenticating

What is Tailgating

100

What is a DoS and DDoS attack?

What is continually bombarding a targeted network with fake requests and DDoS uses a botnet

100

What is a test that gives little to no information about the system to the penetration tester?

What is Black Box or unknown environment testing

100

What requires a carrier file to self-replicate?

What is a Virus

100

A network site that appears to have valuable information but is in fact isolated and monitored is what kind of security measure?

What is a Honeynet

100

What has an embedded Wi-Fi controller that allows a remote user to send commands?

 What is a Malicious Universal Serial Bus (USB) cable

200

Someone going through trash is called what?

What is Dumpster Diving

200

What is an ARP spoofing attack?

What is causing the domain name server (DNS) to return an incorrect IP address

200

What offers the strongest wireless signal encryption?

What is WPA (2)

200

Installing an application that appears to be good but is malware is called what?

What is a Trojan

200

Which of the following is NOT a password cracking software tool?

A. HoneyMonkey

B. Cain and Abel

C. John the Ripper

D. Hashcat


What is HoneyMonkey

200

some flash drives barely larger than a fingernail when inserted into a system and not detected, can do what?

What is commands can be sent and received, data exfiltrated, and malware delivered.

300

While on an airplane someone behind you looking at your computer screen is called what?

What is shoulder surfing

300

Someone posing as an IT tech requests information about your computer configuration is called what?

What is Social engineering 

300

What are two types of intrusion detection systems?

What is Host and network (HIDS and NIDS)

300

A screen pops up stating "Oops all your files are now encrypted pay $300 to get them back" is what?

What is Ransomware

300

An event signaling an IDS to produce an alarm when no attack has taken place would be called what?

What is False Positive

300

What compromises your credit card information by recording it when the card is inserted into an ATM

What is a a skimming attack

400

What describes monitoring software installed without your consent?

What is Spyware

400

What describes a zero-day vulnerability?

What is an attack that exploits a previously unknown vulnerability

400

What describes asymmetric key encryption?

What is consists of a private signing key and a public verification key

400

This needs no interaction to self-propagate?

What is a Worm

400

Which of the following remote protocols is a secure remote access protocol?

A. SSH

B. FTP

C. Telnet

D. SMTP

What is SSH

400

What are individual cloning access cards called?

What is card cloning (think about badges allowing access into buildings, for example

500

 What are two types of network layer firewalls?

What is stateful and stateless

500

Which of the following is NOT a DoS attack? 

A. Server Spoofing

B. Ping Broadcast

C. Ping of Death

D. Smurf

What is Server Spoofing

500

Where in the network infrastructure would a DMZ or 

Perimeter network be set up?

Where is Between the external network and the firewall

500

This allows someone to bypass normal authentication through a _______ door?

What is Back Door

500

Which of the following would NOT help secure a wireless access point?

A. Implement Smart Card authentication

B. Disable SSID broadcast

C. Disable MAC filtering

D. Enable encryption

What is Disable MAC filtering

500

What is leaving USB or thumb drivers around to be found

What is malicious flash drives (or “thumb” drives) within organizations