Attack Techniques Hide and Seek Phishing Scam Techniques Hacky Activity Notable Malware Attacks
100
What is Reconnaissance?
This technique can involve using OSINT as a starting point.
100
What is Encryption?
The purpose of this technique is to transform data in order to keep it secret from others.
100
What is Whaling?
These attacks work because executives often don’t participate in security awareness training with their employees.
100
What is a Penetration Test?
This is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.
100
What is Stuxnet?
A political attack on Iran's nuclear program.
200
What is Password Spraying?
Adversaries may use a single or small list of commonly used passwords against many different accounts to attempt to acquire valid account credentials and avoid detection.
200
What is Encoding?
This technique involves the use of code to change original data into a form that can be used by an external process.
200
What is Extortion?
The emails say there is an explosive device in your building and demands bitcoin in exchange for your life.
200
What is Vulnerability Scanning?
This is a type of assessment identifies weaknesses.
200
What is WannaCry?
People were turned away from hospitals globally during this ransomware attack.
300
What is Port Scanning?
The answer is this image.
300
What is Hashing?
This method can be used to provide a forensically sound piece of evidence.
300
What is Coercion?
The email threatens something bad will happen to your account unless you follow the instructions.
300
What is a Red Team?
The function of this is to test an organizations incident response team.
300
What is Heartbleed?
A buggy implementation of the RFC 6520 Heartbeat extension led to this attack.
400
What is CSRF?
This attack tricks a user into thinking they are visiting bank.com but really they are visiting evil.com.
400
What is Obfuscation?
This is used when trying to keep a secret.
400
What is Blackmail?
The emails say they hacked into your computer and recorded you visiting adult websites. They threaten to distribute the video to your friends and family within hours, unless you pay into their Bitcoin account.
400
What is Bug Bounty?
This activity gives a malicious actor an opportunity to become an ethical hacker.
0
500
What is Command and Control?
Once communication is established, the infected machine sends a signal to the attacker’s server looking for its next instruction.
500
What is Perfect Forward Secrecy?
It is a property of an encryption system that prevents an attacker that from decrypting past recorded sessions even after the private key of the server is leaked in the future.
500
500
0

Security Jeopardy

Press F11 for full screen mode





Clone | Edit | Download / Play Offline