Threat Hunting & Cyber Security Assessment

Test your knowledge on advanced cyber defense methodologies.

Question 1: What is the primary goal of Threat Hunting?

Question 2: Which of the following is NOT a common phase in the Cyber Kill Chain?

Question 3: What does MITRE ATT&CK stand for?

Question 4: What is a "Zero-Day" vulnerability?

Question 5: Which of the following best describes "Indicators of Compromise" (IOCs)?

Question 6: What is the primary function of a Security Information and Event Management (SIEM) system?

Question 7: What is "Phishing"?

Question 8: What is a "Distributed Denial of Service" (DDoS) attack?

Question 9: What is the principle of "Least Privilege"?

Question 10: Which cryptographic technique ensures data confidentiality?

Question 11: What is the purpose of a Firewall?

Question 12: What is the most common use of a Virtual Private Network (VPN)?

Question 13: What is "Social Engineering"?

Question 14: Which attack attempts to execute malicious code by injecting it into input fields?

Question 15: What is the primary purpose of a "Security Incident Response Plan"?

Question 16: What is a "Buffer Overflow" attack?

Question 17: Which term describes the process of converting data into a secret code to hide its information?

Question 18: What is "Malware"?

Question 19: Which security concept involves authenticating users multiple times during a session?

Question 20: What is the primary defense against a "Brute Force" attack?

Question 21: Which type of malware records user keystrokes?

Question 22: What is the role of a honeypot in cybersecurity?

Question 23: What is "Penetration Testing"?

Question 24: What is the primary purpose of Multi-Factor Authentication (MFA)?

Question 25: Which framework provides guidance on improving critical infrastructure cybersecurity?

Question 26: What is a "Man-in-the-Middle" (MitM) attack?

Question 27: What is the main goal of "Data Loss Prevention" (DLP) solutions?

Question 28: What is "Vulnerability Scanning"?

Question 29: What is "Endpoint Detection and Response" (EDR)?

Question 30: What is the purpose of "Hashing" in cybersecurity?

Question 31: Which type of attack involves tricking a web browser into executing malicious scripts?

Question 32: What is the primary benefit of "Security Awareness Training"?

Question 33: What is "Ransomware"?

Question 34: What is the role of a "Demilitarized Zone" (DMZ) in network security?

Question 35: Which protocol is used for secure web browsing?

Question 36: What is a "Rootkit"?

Question 37: What is the "Confidentiality, Integrity, Availability" (CIA) triad?

Question 38: What is "Tokenization" in data security?

Question 39: What is "Business Continuity Planning" (BCP)?

Question 40: Which attack exploits vulnerabilities in web applications to bypass security controls?

Question 41: What is "Zero Trust" security?

Question 42: What is the primary purpose of a "Web Application Firewall" (WAF)?

Question 43: Which principle dictates that security controls should be layered and redundant?

Question 44: What is a "Side-Channel Attack"?

Question 45: What is "Patch Management"?

Question 46: What is a "Threat Actor"?

Question 47: Which of the following is an example of a physical security control?

Question 48: What is "Incident Response"?

Question 49: What is the primary purpose of "Security Auditing"?

Question 50: What is a "Botnet"?

Question 51: Which attack targets an individual or organization with highly customized phishing emails?

Question 52: What is the purpose of "Intrusion Detection Systems" (IDS)?

Question 53: What is "Supply Chain Attack"?

Question 54: Which concept ensures that a system remains operational even if some components fail?

Question 55: What is "Data Encryption at Rest"?

Question 56: What is a "Logic Bomb"?

Question 57: What is "Threat Intelligence"?

Question 58: Which of the following is crucial for "Digital Forensics"?

Question 59: What is "Security Information and Event Management" (SIEM)?

Question 60: What is a "Vulnerability Assessment"?

Question 61: Which term refers to the unauthorized acquisition of sensitive data by a third party?

Question 62: What is "Risk Management" in cybersecurity?

Question 63: What is "Endpoint Protection Platform" (EPP)?

Question 64: Which term describes the process of making sure data has not been altered or destroyed in an unauthorized manner?

Question 65: What is a "Spear Phishing" attack?

Question 66: What is the primary function of "Security Orchestration, Automation, and Response" (SOAR)?

Question 67: What is "Cloud Security"?

Question 68: Which attack involves an attacker gaining initial access to a low-privilege system and then escalating their privileges?

Question 69: What is "Security Operations Center" (SOC)?

Question 70: What is the main goal of "Threat Modeling"?

Question 71: What is "Information Governance"?

Question 72: What is a "Cross-Site Request Forgery" (CSRF) attack?

Question 73: What is "Intrusion Prevention System" (IPS)?

Question 74: What is "Cryptocurrency Mining Malware"?

Question 75: What is "Security Architecture"?

Question 76: Which attack vector typically exploits human vulnerabilities rather than technical ones?

Question 77: What is "Identity and Access Management" (IAM)?

Question 78: What is "Security Information Sharing"?

Question 79: What is "Software Defined Networking" (SDN) security?

Question 80: Which regulation focuses on protecting personal data and privacy in the European Union?

Question 81: What is "Automated Threat Response"?

Question 82: What is "Security Policy"?

Question 83: What is "Container Security"?

Question 84: What is "DevSecOps"?

Question 85: Which attack involves impersonating a legitimate website or service to trick users into revealing credentials?

Question 86: What is "Security Event Management" (SEM)?

Question 87: What is a "Trusted Platform Module" (TPM)?

Question 88: What is "Data Exfiltration"?

Question 89: What is the primary benefit of "Endpoint Detection and Response" (EDR) over traditional antivirus?

Question 90: Which security principle aims to prevent a single person from completing all critical tasks to prevent fraud or error?

Question 91: What is "Vishing"?

Question 92: What is "Cyber Resilience"?

Question 93: What is "Malicious Redirect"?

Question 94: What is "Secure Coding Practices"?

Question 95: What is "Security Patch"?

Question 96: What is "Insider Threat"?

Question 97: What is "Digital Rights Management" (DRM)?

Question 98: What is "Biometric Authentication"?

Question 99: What is a "Trusted Platform Module" (TPM)?

Question 100: What is the main principle behind "Privacy by Design"?