Passwords
Cloud Security
Network Security
Social Engineering
Misc. Security
100

The most common word used as a weak password.

What is "password"?

100

A kind of backup is a backup that is stored in multiple places geographically.

What is a “Geo-redundant” backup?

100

This device is commonly used to protect a network by filtering incoming and outgoing traffic based on security rules.

What is a firewall?

100

A technique where an attacker tricks someone into revealing confidential information, often over the phone or email.

What is phishing?

100

This is the simple action you should take to prevent unauthorized access when you step away from your computer.

What is locking your screen?

200

A device that captures your password as you type it in.

What is a “keylogger”?

200

When data is encrypted while in storage/on disk it is call what.

What is “Encryption at rest”?

200

The acronym "VPN" stand for this.

What is Virtual Private Network?

200

Someone is doing this if they are spying on your Laptop screen as you work in public or private.

What is "Shoulder Surfing"?

200

This is the practice of dividing networks into multiple tiers and/or security levels.

What is Network Segmentation?

300

Two-factor authentication (2FA) often used to protect this.

What is access to accounts?

300

This technical standard is used by SSO providers to communicate that a user has been authenticated.

What is “SAML”?

300

The name of this attack floods a network or server with traffic to overwhelm it and cause service disruption.

What is a Distributed Denial of Service (DDoS)  or Denial of Service (DoS) attack?

300

This attack is called what when a phishing attack targets Top Level employees specifically?

What is "Whaling"?

300

This type of backup ensures that all your data is saved so that it can be restored in case of a system failure.

What is a full backup?

400

A method attackers use to guess passwords by systematically trying every possible combination.

What is a brute-force attack?

400

This is the term for a cloud feature that allows temporary administrative access on an as-needed basis.

What is “Privileged Identity Management”?

400

This device is used to monitor and manage traffic between different segments of a network to ensure secure communication.

What is a router?

400

Software that is delivered in the form of pop-ups that alert the victim that their device or application is at risk or compromised.

What is "Scareware"?

400

This principle states that users should only have the minimum level of access necessary to perform their jobs.

What is the principle of least privilege?

500

A security feature that generates a new password after each login, enhancing protection against replay attacks.

What is a one-time password (OTP)?

500

This is the term for a cloud-based Layer 4 virtual firewall that manages and controls inbound and outbound network traffic to enhance security.

What is “Security Group/Network Security Group”?

500

This is the name for the list of rules that specify which users/processes have access to which resources.

What is an Access Control List?

500

The term for attackers gathering information about their targets through publicly available sources, such as social media.

What is Open-Source Intelligence (OSINT)?

500

This type of attack does not yet have a remedy and is unknown to the public.

What is a "Zero-Day" attack?