Security Foundations
Malware Family
Sneaky Threats
Attack Mechanics
Mix & Match
100

The three pillars of the CIA Triad are these.

What are Confidentiality, Integrity, and Availability?

100

The word “malware” is short for this phrase, describing harmful programs designed to damage, disrupt, or steal data.

Malicious Software

100

This type of malware disguises itself as legitimate software but secretly delivers malicious code.

Trojan Horse

100

This type of malware changes its code or appearance every time it spreads.

Polymorphic Malware

100

This type of malicious program is considered the most dangerous to confidentiality, since it secretly allows attackers to access sensitive data without detection.

Backdoor

200

In the CIA Triad, this pillar ensures that information is not altered or tampered with.

Integrity

200

A computer program that damages systems, steals data, or disrupts operations is broadly called this.

Malware

200

This malware locks or encrypts files and demands payment from the victim to restore access.

Ransomware

200

Polymorphic malware avoids detection by doing this, while still keeping the same malicious behavior.

Constantly changing its code

200

Among ransomware and a worm that launches Distributed Denial of Service attacks, this one poses the greater risk to availability by overwhelming systems and taking them offline.

DDoS worm

300

In the CIA Triad, this pillar ensures that data is only available to authorized people.

Confidentiality

300

A program that attaches itself to files and spreads when those files are executed is called this.

Virus

300

For a Trojan Horse, this aspect is the greater danger—since it tricks users into installing it in the first place.

Disguise

300

This type of malware avoids detection by constantly changing its code while keeping the same malicious behavior.

Polymorphic Malware

300

Within the CIA+ model, this feature ensures that a sender cannot later deny sending a malicious email, often enforced through mechanisms like digital signatures.

Non-repudiation

400

Within CIA+, this concept verifies a user’s identity, proving they are who they claim to be.

Authentication

400

A program that self-replicates across networks without needing a host file is called this.

Worm

400

In cybersecurity, this is a hidden method of bypassing authentication to gain unauthorized access to a system.

Backdoor

400

The difference between these two is that one keeps the same code and is easier to detect, while the other changes its code every time it spreads.

The difference between standard and polymorphic malware

400

If ransomware locks all your files so you cannot use them, this principle of the CIA Triad is violated.

Availability

500

Within CIA+, this concept provides proof that a user cannot deny an action they performed.

Non-repudiation

500

Between a worm and a virus, this one spreads faster because it doesn’t need a host file or user action.

Worm

500

The difference between these two is that one is usually inserted maliciously by attackers, while the other is intentionally left by developers to bypass security during development.

What is the difference between a backdoor and a trapdoor?

500

This term refers to the method or pathway through which malware spreads.

Propagation Vector

500

When a worm deletes records from a database, it compromises this principle of the CIA Triad, which ensures information remains accurate and unaltered.

Integrity