Ports
Viruses
Physical Security
Service Attacks
Social Engineering
100

Port 80

What is Hyper Text Transfer Protocol (HTTP)?

100

Malware that allows an attacker to take control of a system from a remote location

What is RAT(Remote Access Trojan)?

100

One person follows behind another person with out using credentials in this attack.

What is tailgating?

100

An attack from a single source that attempts to disrupt the services provided by the attacked system

What is a Denial of Service(DoS) attack?

100

The practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link

What is Phishing?

200

This Port is used for Telnet, an unencrypted method to remotely administer a device.

What is port 23?

200

Self-replicating malware that travels through a network. Do not need user interaction to execute.

What is a worm?

200

The practice of searching through trash looking to gain information from discarded documents

What is dumpster diving?

200

A web application vulnerability. Attackers embed malicious HTML or JavaScript code into a web site's code, which executes when a user visits the site.

What is Cross-site scripting(XSS)?

200

A form of spear phishing that attempts to target high-level executives

What is Whaling?

300

Port 110, used to receive email from a mail server

What is Post Office Protocol v3 (POP3)?

300

A type of malware that has system-level access to a computer.

What is a Rootkit?
300

 A physical security mechanism designed to control access to a secure area

What is a mantrap?

300

This is an attack using active interception or eavesdropping. It uses a third computer to capture traffic sent between two other systems.

What is a Man-in-the-middle Attack?

300

An attack method that infects web sites that a group is likely to trust and visit.

What is a Watering Hole attack?

400

This port is used for transmission of web page data to a client over an SSL/TLS encrypted connection

What is port 443(HTTPS)?

400

A type of malware that executes in response to an event. The event might be a Special date or time, or a user action such as when a user launches a specific program.

What is a logic bomb?

400

Small credit card-sized that uses NFC to authorize personnel to open doors

What is a proximity card?

400

This is a password attack that captures and uses the hash of a password It attempts to log on as the user with the hash

What is Pass the hash?

400

The purchase of a domain name that is close to a legitimate domain name. Attackers often try to trick users who inadvertently use the wrong domain name. Also called URL hijacking.

What is Typo Squatting?

500

Remote Desktop Protocol(RDP) is used to remotely view and control other Windows systems uses this port 

What is port 3389?

500

A type of ransomware that encrypts the user's data.

What is Crypto-malware?

500

PTZ is an acronym for this feature in in many CCTV systems

What is Pan Tilt Zoom?

500

this is the process of gaining elevated rights and permissions

What is Privilege Escalation?

500

You can use a screen filter to protect against and reduce the success of this social engendering attack

What is shoulder surfing?