A comprehensive repository for security professionals, covering the CIA Triad, Network & Endpoint Security, Malware Analysis, SOC Monitoring (SIEM/SOAR), Incident Response, and Global Compliance standards.
Total Questions:475
Difficulty Levels:
BeginnerIntermediateAdvanced
0%
Overall Progress
0/475
Status
Problem
Level
2.What is the CIA Triad in cybersecurity?
Easy
3.Explain Confidentiality, Integrity, and Availability.
Easy
4.What is the difference between a threat, vulnerability, and risk?
Medium
5.What is risk assessment in cybersecurity?
Medium
6.What is the AAA framework (Authentication, Authorization, Accounting)?
Medium
7.What is Defense in Depth strategy?
Medium
8.What is the principle of Least Privilege?
Easy
9.What is Zero Trust security model?
Medium
10.What is the difference between information security and cybersecurity?
Easy
11.What is a security incident vs security event?
Medium
12.What is incident response?
Easy
13.What is the incident response lifecycle?
Medium
14.What are the phases of incident response (NIST framework)?
Hard
15.What is a security breach?
Easy
16.What is data breach vs system breach?
Medium
17.What is a security policy?
Easy
18.What is acceptable use policy (AUP)?
Easy
19.What is security awareness training?
Easy
20.What is social engineering?
Easy
21.What are common social engineering techniques?
Medium
22.What is phishing?
Easy
23.What is spear phishing vs whaling?
Medium
24.What is vishing and smishing?
Easy
25.What is pretexting?
Medium
26.What is baiting in social engineering?
Easy
27.What is tailgating/piggybacking?
Easy
28.What is dumpster diving?
Easy
29.How do you prevent social engineering attacks?
Medium
30.What is security hygiene?
Easy
31.What is a firewall?
Easy
32.What is the difference between stateful and stateless firewall?
Medium
33.What is Next-Generation Firewall (NGFW)?
Medium
34.What is Web Application Firewall (WAF)?
Medium
35.What is the difference between firewall and WAF?
Medium
36.What is DMZ (Demilitarized Zone)?
Medium
37.What is network segmentation?
Medium
38.What is VLAN (Virtual Local Area Network)?
Easy
39.What is VPN (Virtual Private Network)?
Easy
40.What is the difference between site-to-site and remote access VPN?
Medium
41.What is IPsec VPN?
Hard
42.What is SSL/TLS VPN?
Medium
43.What is split tunneling in VPN?
Medium
44.What is IDS (Intrusion Detection System)?
Easy
45.What is IPS (Intrusion Prevention System)?
Easy
46.What is the difference between IDS and IPS?
Easy
47.What is network-based IDS vs host-based IDS?
Medium
48.What is signature-based detection vs anomaly-based detection?
Medium
49.What is Snort IDS?
Medium
50.What is Suricata?
Medium
51.What is DDoS attack?
Easy
52.What are types of DDoS attacks (volumetric, protocol, application layer)?
Hard
53.How do you mitigate DDoS attacks?
Medium
54.What is SYN flood attack?
Medium
55.What is UDP flood attack?
Medium
56.What is DNS amplification attack?
Hard
57.What is Man-in-the-Middle (MITM) attack?
Easy
58.What is ARP spoofing?
Medium
59.What is DNS spoofing?
Medium
60.What is session hijacking?
Medium
61.What is packet sniffing?
Easy
62.What is Wireshark?
Easy
63.What is tcpdump?
Medium
64.How do you analyze network traffic?
Medium
65.What is port scanning?
Easy
66.What is Nmap?
Easy
67.What are common Nmap commands?
Medium
68.What is banner grabbing?
Medium
69.What is network access control (NAC)?
Medium
70.What is 802.1X authentication?
Hard
71.What is MAC address filtering?
Easy
72.What is network monitoring?
Easy
73.What is NetFlow?
Medium
74.What is SIEM integration with network devices?
Medium
75.What is east-west traffic vs north-south traffic?
Medium
76.What is micro-segmentation?
Hard
77.What is VXLAN?
Hard
78.What is Software-Defined Networking (SDN) security?
Hard
79.What is zero-trust network access (ZTNA)?
Medium
80.What is secure network architecture design?
Hard
81.What is endpoint security?
Easy
82.What is antivirus vs anti-malware?
Easy
83.What is EDR (Endpoint Detection and Response)?
Medium
84.What is the difference between antivirus and EDR?
Medium
85.What is XDR (Extended Detection and Response)?
Hard
86.What is host-based firewall?
Easy
87.What is application whitelisting?
Medium
88.What is application blacklisting?
Easy
89.What is the difference between whitelisting and blacklisting?
Easy
90.What is device encryption?
Easy
91.What is full disk encryption (FDE)?
Medium
92.What is BitLocker?
Easy
93.What is FileVault?
Easy
94.What is TPM (Trusted Platform Module)?
Medium
95.What is patch management?
Easy
96.Why is patch management important?
Easy
97.What is vulnerability patching?
Medium
98.What is zero-day vulnerability?
Medium
99.What is exploit?
Medium
100.What is the difference between vulnerability and exploit?
Easy
101.What is Mobile Device Management (MDM)?
Easy
102.What is BYOD (Bring Your Own Device) security?
Medium
103.What is remote wipe capability?
Easy
104.What is USB device control?
Medium
105.What is DLP (Data Loss Prevention) for endpoints?
Medium
106.What is behavioral analysis for endpoints?
Medium
107.What is sandboxing?
Medium
108.What is memory protection?
Hard
109.What is ASLR (Address Space Layout Randomization)?
Hard
110.What is DEP (Data Execution Prevention)?
Hard
111.What is malware?
Easy
112.What are the types of malware?
Easy
113.What is a virus?
Easy
114.What is a worm?
Easy
115.What is a Trojan horse?
Easy
116.What is ransomware?
Easy
117.What is the difference between virus and worm?
Easy
118.What is spyware?
Easy
119.What is adware?
Easy
120.What is rootkit?
Medium
121.What is bootkit?
Hard
122.What is keylogger?
Easy
123.What is backdoor?
Medium
124.What is RAT (Remote Access Trojan)?
Medium
125.What is cryptojacking?
Medium
126.What is fileless malware?
Hard
127.What is polymorphic malware?
Hard
128.What is metamorphic malware?
Hard
129.What is malware analysis?
Medium
130.What is static analysis vs dynamic analysis?
Medium
131.What is sandboxed malware analysis?
Medium
132.What is behavioral analysis of malware?
Medium
133.What is reverse engineering malware?
Hard
134.What is indicators of compromise (IOC)?
Medium
135.What is YARA rules?
Hard
136.What is hash analysis (MD5, SHA-1, SHA-256)?
Easy
137.What is VirusTotal?
Easy
138.What is malware signature?
Easy
139.What is heuristic analysis?
Medium
140.What is CryptoLocker ransomware?
Easy
141.What is WannaCry ransomware?
Medium
142.How does ransomware spread?
Easy
143.How do you recover from ransomware attack?
Medium
144.What is the best defense against ransomware?
Easy
145.What is malware removal process?
Medium
146.What is quarantine in antivirus?
Easy
147.What is false positive in malware detection?
Easy
148.What is advanced persistent threat (APT)?
Hard
149.What is command and control (C2) server?
Medium
150.What is lateral movement in malware attacks?
Medium
151.What is vulnerability management?
Easy
152.What is vulnerability scanning?
Easy
153.What is vulnerability assessment?
Medium
154.What is the difference between vulnerability scan and penetration test?
Medium
155.What is Nessus?
Easy
156.What is OpenVAS?
Medium
157.What is Qualys?
Medium
158.What is vulnerability scoring?
Easy
159.What is CVSS (Common Vulnerability Scoring System)?
Medium
160.What is CVE (Common Vulnerabilities and Exposures)?
Easy
161.What is the difference between CVE and CVSS?
Easy
162.What is NVD (National Vulnerability Database)?
Medium
163.What is vulnerability prioritization?
Medium
164.What is risk-based vulnerability management?
Hard
165.What is remediation vs mitigation?
Medium
166.What is compensating control?
Hard
167.What is vulnerability lifecycle?
Medium
168.What is continuous vulnerability scanning?
Medium
169.What is authenticated vs unauthenticated scan?
Hard
170.What is agent-based vs agentless scanning?
Hard
171.What is network vulnerability scanning?
Easy
172.What is web application vulnerability scanning?
Medium
173.What is false positive vs false negative in scanning?
Easy
174.What is vulnerability reporting?
Easy
175.What is SLA for vulnerability remediation?
Medium
176.What is critical vs high vs medium vulnerability?
Easy
177.What is exploitability in vulnerability assessment?
Medium
178.What is attack surface?
Easy
179.What is attack vector?
Easy
180.What is exposure management?
Hard
181.What is penetration testing?
Easy
182.What is ethical hacking?
Easy
183.What is the difference between white hat, black hat, and grey hat?
Easy
184.What is the penetration testing methodology?
Medium
185.What are the phases of penetration testing?
Medium
186.What is reconnaissance in penetration testing?
Easy
187.What is passive reconnaissance vs active reconnaissance?
Medium
188.What is OSINT (Open Source Intelligence)?
Easy
189.What is scanning and enumeration?
Medium
190.What is exploitation phase?
Easy
191.What is post-exploitation?
Medium
192.What is privilege escalation?
Medium
193.What is lateral movement?
Medium
194.What is persistence in penetration testing?
Hard
195.What is pivoting?
Hard
196.What is Metasploit Framework?
Medium
197.What is Burp Suite?
Medium
198.What is OWASP ZAP?
Medium
199.What is Kali Linux?
Easy
200.What is Parrot OS?
Easy
201.What is web application security?
Easy
202.What is OWASP Top 10?
Easy
203.What are the OWASP Top 10 vulnerabilities (latest)?
Medium
204.What is injection attack?
Easy
205.What is SQL injection and how to prevent it?
Medium
206.What is prepared statement?
Medium
207.What is parameterized query?
Easy
208.What is broken authentication?
Medium
209.What is session management vulnerability?
Medium
210.What is session fixation?
Hard
211.What is sensitive data exposure?
Easy
212.What is encryption at rest vs in transit?
Easy
213.What is XML External Entities (XXE)?
Hard
214.What is broken access control?
Medium
215.What is horizontal privilege escalation?
Medium
216.What is vertical privilege escalation?
Medium
217.What is security misconfiguration?
Easy
218.What is default credentials risk?
Easy
219.What is directory listing vulnerability?
Medium
220.What is cross-site scripting (XSS) in detail?
Medium
221.What is DOM-based XSS?
Hard
222.What is XSS prevention techniques?
Medium
223.What is Content Security Policy (CSP)?
Hard
224.What is insecure deserialization?
Hard
225.What is using components with known vulnerabilities?
Easy
226.What is insufficient logging and monitoring?
Medium
227.What is clickjacking?
Medium
228.What is X-Frame-Options header?
Medium
229.What is open redirect vulnerability?
Easy
230.What is HTTP response splitting?
Hard
231.What is API security?
Medium
232.What is REST API security best practices?
Medium
233.What is OAuth 2.0 security?
Hard
234.What is JWT (JSON Web Token) vulnerability?
Hard
235.What is API rate limiting?
Medium
236.What is CORS (Cross-Origin Resource Sharing)?
Medium
237.What is same-origin policy?
Medium
238.What is HTTPS and SSL/TLS?
Easy
239.What is certificate pinning?
Hard
240.What is HSTS (HTTP Strict Transport Security)?
Medium
241.What is identity and access management?
Easy
242.What is authentication?
Easy
243.What is authorization?
Easy
244.What is the difference between authentication and authorization?
Easy
245.What is identification?
Easy
246.What is multi-factor authentication (MFA)?
Easy
247.What are the factors of authentication (something you know, have, are)?
Easy
248.What is two-factor authentication (2FA)?
Easy
249.What is SMS-based 2FA and its risks?
Medium
250.What is TOTP (Time-based One-Time Password)?
Medium
251.What is authenticator app?
Easy
252.What is hardware token (YubiKey)?
Medium
253.What is biometric authentication?
Easy
254.What is passwordless authentication?
Medium
255.What is Single Sign-On (SSO)?
Medium
256.What is SAML (Security Assertion Markup Language)?
Hard
257.What is OAuth vs SAML?
Hard
258.What is OpenID Connect?
Hard
259.What is federated identity?
Medium
260.What is identity provider (IdP)?
Medium
261.What is Active Directory?
Easy
262.What is LDAP (Lightweight Directory Access Protocol)?
Medium
263.What is Kerberos authentication?
Hard
264.What is NTLM authentication?
Medium
265.What is pass-the-hash attack?
Hard
266.What is Kerberoasting?
Hard
267.What is Golden Ticket attack?
Hard
268.What is privileged access management (PAM)?
Medium
269.What is just-in-time (JIT) access?
Hard
270.What is role-based access control (RBAC)?
Easy
271.What is attribute-based access control (ABAC)?
Hard
272.What is least privilege principle?
Easy
273.What is separation of duties?
Medium
274.What is access review?
Medium
275.What is account provisioning and deprovisioning?
Easy
276.What is orphaned account?
Easy
277.What is credential stuffing attack?
Medium
278.What is password spraying attack?
Medium
279.What is brute force attack on authentication?
Easy
280.What is account lockout policy?
Easy
281.What is cryptography?
Easy
282.What is encryption?
Easy
283.What is the difference between encryption and hashing?
Medium
284.What is symmetric encryption?
Easy
285.What is asymmetric encryption?
Easy
286.What is the difference between symmetric and asymmetric encryption?
Medium
287.What is AES encryption?
Medium
288.What is RSA encryption?
Medium
289.What is DES and 3DES?
Medium
290.Why is DES deprecated?
Easy
291.What is encryption key?
Easy
292.What is key length (128-bit, 256-bit)?
Easy
293.What is public key and private key?
Easy
294.What is public key infrastructure (PKI)?
Hard
295.What is digital certificate?
Medium
296.What is certificate authority (CA)?
Medium
297.What is X.509 certificate?
Hard
298.What is SSL/TLS protocol?
Easy
299.What is TLS 1.2 vs TLS 1.3?
Hard
300.What is SSL certificate types (DV, OV, EV)?
Medium
301.What is self-signed certificate?
Easy
302.What is certificate chain?
Medium
303.What is certificate pinning?
Hard
304.What is certificate revocation?
Medium
305.What is CRL (Certificate Revocation List)?
Medium
306.What is OCSP (Online Certificate Status Protocol)?
Hard
307.What is hashing?
Easy
308.What is hash function?
Easy
309.What is MD5 hash?
Easy
310.What is SHA-1, SHA-256, SHA-512?
Medium
311.Why is MD5 insecure?
Medium
312.What is collision in hashing?
Medium
313.What is salted hash?
Medium
314.What is rainbow table?
Medium
315.What is HMAC (Hash-based Message Authentication Code)?
Hard
316.What is digital signature?
Medium
317.What is code signing?
Medium
318.What is end-to-end encryption (E2EE)?
Easy
319.What is perfect forward secrecy (PFS)?
Hard
320.What is Diffie-Hellman key exchange?
Hard
321.What is security monitoring?
Easy
322.What is SIEM (Security Information and Event Management)?
Easy
323.What is the difference between SIEM and log management?
Medium
324.What is SOAR (Security Orchestration, Automation and Response)?
Medium
325.What is the difference between SIEM and SOAR?
Medium
326.What is Splunk?
Easy
327.What is IBM QRadar?
Medium
328.What is ArcSight?
Medium
329.What is LogRhythm?
Medium
330.What is Elastic Stack (ELK)?
Medium
331.What is log aggregation?
Easy
332.What is log correlation?
Medium
333.What is security event?
Easy
334.What is alert vs event?
Easy
335.What is false positive in SIEM?
Easy
336.What is alert tuning?
Medium
337.What is alert fatigue?
Easy
338.What is use case in SIEM?
Medium
339.What is correlation rule?
Medium
340.What is baseline in security monitoring?
Medium
341.What is anomaly detection?
Medium
342.What is behavior analytics (UEBA)?
Hard
343.What is user and entity behavior analytics?
Hard
344.What is threat intelligence?
Medium
345.What is threat feed?
Easy
346.What is IOC (Indicator of Compromise)?
Easy
347.What is TTPs (Tactics, Techniques, and Procedures)?
Medium
348.What is MITRE ATT&CK framework?
Hard
349.What is Cyber Kill Chain?
Medium
350.What is Diamond Model of Intrusion Analysis?
Hard
351.What is security incident investigation?
Medium
352.What is log retention policy?
Easy
353.What is compliance logging?
Medium
354.What is audit trail?
Easy
355.What is forensic analysis of logs?
Medium
356.What is time synchronization (NTP) importance?
Medium
357.What is security dashboard?
Easy
358.What is KPI vs KRI in security?
Hard
359.What is mean time to detect (MTTD)?
Medium
360.What is mean time to respond (MTTR)?
Medium
361.What is incident response plan?
Easy
362.What is incident response team roles?
Medium
363.What is preparation phase in incident response?
Medium
364.What is detection and analysis phase?
Medium
365.What is containment strategy?
Easy
366.What is short-term vs long-term containment?
Medium
367.What is eradication phase?
Medium
368.What is recovery phase?
Medium
369.What is post-incident activity?
Easy
370.What is lessons learned meeting?
Easy
371.What is incident severity classification?
Medium
372.What is incident prioritization?
Medium
373.What is incident communication plan?
Medium
374.What is escalation procedure?
Easy
375.What is runbook vs playbook?
Hard
376.What is security playbook?
Easy
377.What is digital forensics?
Easy
378.What is forensic investigation process?
Medium
379.What is evidence collection?
Medium
380.What is chain of custody?
Medium
381.What is evidence preservation?
Medium
382.What is forensic imaging?
Medium
383.What is write blocker?
Medium
384.What is dd command for imaging?
Medium
385.What is FTK Imager?
Easy
386.What is memory forensics?
Hard
387.What is volatile vs non-volatile data?
Medium
388.What is RAM analysis?
Hard
389.What is disk forensics?
Medium
390.What is file carving?
Hard
391.What is deleted file recovery?
Medium
392.What is network forensics?
Hard
393.What is packet capture analysis?
Medium
394.What is timeline analysis?
Hard
395.What is log analysis in forensics?
Medium
396.What is rootkit detection?
Hard
397.What is anti-forensics techniques?
Hard
398.What is steganography detection?
Hard
399.What is malware analysis in forensics?
Medium
400.What is breach notification requirements?
Medium
401.What is security compliance?
Easy
402.What is regulatory compliance?
Easy
403.What is PCI-DSS?
Medium
404.What is HIPAA?
Medium
405.What is GDPR?
Medium
406.What is SOX (Sarbanes-Oxley)?
Medium
407.What is ISO 27001?
Hard
408.What is NIST Cybersecurity Framework?
Medium
409.What is CIS Controls?
Medium
410.What is SOC 2 (Type I and Type II)?
Hard
411.What is FISMA?
Medium
412.What is FedRAMP?
Hard
413.What is security audit?
Easy
414.What is internal audit vs external audit?
Easy
415.What is vulnerability assessment vs compliance scan?
Medium
416.What is security policy?
Easy
417.What is security standard?
Medium
418.What is security procedure?
Easy
419.What is security baseline?
Medium
420.What is configuration management?
Medium
421.What is change management?
Easy
422.What is risk management?
Easy
423.What is risk assessment methodology?
Medium
424.What is quantitative vs qualitative risk assessment?
Hard
425.What is risk register?
Medium
426.What is risk treatment options (accept, mitigate, transfer, avoid)?
Medium
427.What is residual risk?
Medium
428.What is business impact analysis (BIA)?
Hard
429.What is disaster recovery plan (DRP)?
Easy
430.What is business continuity plan (BCP)?
Medium
431.What is RTO (Recovery Time Objective)?
Medium
432.What is RPO (Recovery Point Objective)?
Medium
433.What is security awareness program?
Easy
434.What is phishing simulation?
Easy
435.What is security training effectiveness?
Medium
436.What is insider threat program?
Medium
437.What is data classification?
Easy
438.What is data handling policy?
Easy
439.What is acceptable use policy?
Easy
440.What is vendor risk management?
Medium
441.What is third-party risk assessment?
Medium
442.What is security questionnaire?
Easy
443.What is penetration testing compliance?
Medium
444.What is vulnerability disclosure policy?
Hard
445.What is bug bounty program?
Medium
446.You notice unusual outbound traffic at 3 AM - what do you do?
Medium
447.A user reports a phishing email - what are your steps?
Easy
448.Multiple failed login attempts detected - how do you respond?
Medium
449.Ransomware detected on one endpoint - what's your action plan?
Medium
450.User complains their account was compromised - investigation steps?
Medium
451.Port scan detected from external IP - what do you check?
Easy
452.Alert shows data exfiltration to unknown destination - response?
Hard
453.Critical vulnerability found in production server - how to handle?
Medium
454.CEO's credentials found on dark web - what do you do?
Medium
455.Suspicious PowerShell script execution - how to investigate?
Hard
456.New malware variant not detected by antivirus - next steps?
Hard
457.DDoS attack targeting your website - mitigation strategy?
Medium
458.Insider threat suspected - how do you investigate?
Hard
459.Zero-day exploit announced for software you use - actions?
Medium
460.Audit shows unpatched systems - how to prioritize?
Medium
461.User bypassed security controls - how to address?
Medium
462.Security tool generating too many false positives - solution?
Medium
463.Compliance audit in 2 weeks, gaps identified - plan?
Medium
464.Third-party vendor breached - what's your response?
Hard
465.Cryptojacking detected on servers - remediation steps?