Threats & Attacks
Cryptograpyhy
Network Security
Identity & Access Management
Policies & Risk
100

Malware that appears to be legitimate software but harms your system once installed.

What is a Trojan horse?

100

Encrypts data in a way that only the intended recipient can decrypt it.

What is asymmetric encryption?

100

A security device that blocks unauthorized traffic based on rules.

What is a firewall?

100

Ensures that users can access only what they are authorized to use.

What is authorization?

100

Document that outlines acceptable behavior for users on a network or system.

What is an acceptable use policy (AUP)?

200

This type of attack floods a system or network with traffic to make it unavailable.

What is a Denial of Service (DoS) attack?

200

A hash function commonly used to verify data integrity.

What is SHA-256?

200

Protocol used to encrypt web traffic.

What is HTTPS?

200

Security model that grants the least permissions necessary for a user to perform their job.

What is least privilege?

200

Process of identifying and prioritizing risks to minimize their impact.

What is risk management?

300

Social engineering attack where the attacker pretends to be a trusted source via email.

What is phishing?

300

A symmetric encryption algorithm widely used to protect data at rest and in transit.

What is AES (Advanced Encryption Standard)?

300

Wireless security protocol that replaced WEP due to stronger encryption.

What is WPA2?

300

Single sign-on and multi-factor authentication are examples of this type of security control.

What is access control?

300

This type of backup protects against data loss by keeping multiple copies over time.

What is redundancy/backups?

400

Malware that secretly monitors user activity and records keystrokes.

What is a keylogger?

400

Digital certificates rely on this infrastructure to verify identities and secure communication.

What is PKI (Public Key Infrastructure)?

400

A network monitoring tool that captures and analyzes packets for security issues.

What is a packet sniffer?

400

A system that centralizes authentication for multiple applications and services.

What is identity federation?

400

Legal and regulatory requirements that organizations must follow to protect data.

What is compliance?

500

Attack where the hacker injects malicious code into a website to manipulate user data.

What is cross-site scripting (XSS)?

500

This cryptographic attack attempts to deduce the encryption key by analyzing ciphertext only.

What is a ciphertext-only attack?

500

Attack where a hacker intercepts communications between two parties on a network.

What is a man-in-the-middle attack?

500

Factor of authentication that uses something you are, like a fingerprint.

What is biometric?

500

Process of simulating attacks to identify vulnerabilities before attackers do.

What is penetration testing (pen testing)?