FBLA - CYBERSECURITY - BY GUY WHO WON NATIONALLY
QUESTIONS WITH CORRECT ANSWERS 2025
VirusH-HCORRECTHANSWERH-
AHpieceHofHcodeHthatHisHcapableHofHcopyingHitselfHandHtypicallyHhasHaHdetrimentalHeffect,HsuchHasHc
orruptingHtheHsystemHorHdestroyingHdata
SocialHEngineeringH-HCORRECTHANSWERH-
Tricking/DeceivingHSomeoneHintoHgivingHyouHprivateHinformationHorHdata
BackdoorH-HCORRECTHANSWERH-AttackerHgetsHaccessHbyHusingHanHexploitHtoHaccessHtheHsystem
SpywareH-HCORRECTHANSWERH-
softwareHthatHobtainsHinformationHaboutHanotherHcomputer'sHactivitiesHwithoutHknowledgeHofHth
eHuser
SpearHPhishingHAttackH-HCORRECTHANSWERH-
isHanHemailHorHelectronicHcommunicationsHscamHtargetedHtowardsHaHspecificHindividual,Horganizat
ionHorHbusiness.HAlthoughHoftenHintendedHtoHstealHdataHforHmaliciousHpurposes,HcybercriminalsHm
ayHalsoHintendHtoHinstallHmalwareHonHaHtargetedHuser'sHcomputer.
DOSH-HCORRECTHANSWERH-
DenialHofHService:HanHattemptHtoHmakeHaHmachineHorHnetworkHresourceHunavailableHtoHitsHintend
edHusers,HsuchHasHtoHtemporarilyHorHindefinitelyHinterruptHorHsuspendHservicesHofHaHhostHconnect
edHtoHtheHInternet.
DDOSH-HCORRECTHANSWERH-
DistributedHDenialHofHService:HoccursHwhenHmultipleHsystemsHfloodHtheHbandwidthHorHresourcesH
ofHaHtargetedHsystem,HusuallyHoneHorHmoreHwebHservers.HSuchHanHattackHisHoftenHtheHresultHofHmu
ltipleHcompromisedHsystemsH(forHexample,HaHbotnet)HfloodingHtheHtargetedHsystemHwithHtraffic.
,BotnetH-HCORRECTHANSWERH-
aHnetworkHofHprivateHcomputersHinfectedHwithHmaliciousHsoftwareHandHcontrolledHasHaHgroupHwit
houtHtheHowners'Hknowledge,HusedHtoHsendHspamHmessages,HddosHattacks,HmineHforHcryptocurre
ncy,HandHmore
DumpsterHDivingH-HCORRECTHANSWERH-lookingHthroughHtrashHtoHobtainHsensitiveHinformation
RansomwareH-HCORRECTHANSWERH-
maliciousHsoftwareHthatHblocksHaccessHtoHcomputerHuntilHanHamountHofHmoneyHisHpaid
MalwareH-HCORRECTHANSWERH-
softwareHintendedHtoHharmHcomputers,Hnetworks,Hpeople,HorHbusinesses
Drive-byHDownloadH-HCORRECTHANSWERH-
DownloadsHinstalledHbyHjustHpassingHthroughHanHinfectedHwebpage
E-mailHfloodingH-HCORRECTHANSWERH-
sendingHmanyHemailsHtoHaHtargetHtoHfloodHtheHinboxHandHtakeHdownHtheHserver
TrojanHHorseH-HCORRECTHANSWERH-
aHvirusHdisguisedHasHrealHsoftware,HtoHmakeHitHappearHharmlessHsoHvictimsHdownloadHandHrunHit
WormH-HCORRECTHANSWERH-aHself-
replicatingHvirusHthatHdoesHnotHusuallyHalterHfilesHbutHresidesHinHactiveHmemoryHandHduplicatesHits
elf.HWormsHuseHpartsHofHanHoperatingHsystemHthatHareHautomaticHandHusuallyHinvisibleHtoHtheHuse
r.HItHisHcommonHforHwormsHtoHbeHnoticedHonlyHwhenHtheirHuncontrolledHreplicationHconsumesHsys
temHresources,HslowingHorHhaltingHotherHtasks.
DNSHspoofingH-HCORRECTHANSWERH-
alsoHreferredHtoHasHDNSHcacheHpoisoning,HisHaHformHofHcomputerHhackingHinHwhichHcorruptHDomai
, nHNameHSystemHdataHisHintroducedHintoHaHDNSHresolver'sHcache,HcausingHtheHnameHserverHtoHretu
rnHanHincorrectHIPHaddress,HwhichHresultsHinHdivertingHtrafficHtoHtheHattacker'sHcomputerH(orHanyHo
therHcomputer).
ScarewareH-HCORRECTHANSWERH-
MalwareHwhichHtricksHusersHintoHbuyingHfakeHantivirusHprotection
WhiteHHatH-HCORRECTHANSWERH-
AHhackerHwhoHdoesHgood.HTestsHsecurityHsystemsHwithHconsentHofHtheHowners.
BlackHHatH-HCORRECTHANSWERH-
AHhackerHwhoHusesHtheirHabilitiesHforHmaliciousHpurposesHsuchHasHbreachingHandHbypassingHintern
etHsecuirty.
CyberterroristH-HCORRECTHANSWERH-
SomeoneHwhoHusesHcomputersHtoHcauseHsevereHdamageHorHwidespreadHfearHinHsociety.
HacktivistH-HCORRECTHANSWERH-
aHcomputerHhackerHwhoseHactivityHisHaimedHatHpromotingHaHsocialHorHpoliticalHcause.
CyberespionageH-HCORRECTHANSWERH-
theHuseHofHcomputerHnetworksHtoHgainHillicitHaccessHtoHconfidentialHinformation,HtypicallyHthatHhel
dHbyHaHgovernmentHorHotherHorganization.
BotsH-HCORRECTHANSWERH-
BotsHcanHsendHspamHattacks,HdosHattacks,HandHothers.HMalwareHranHonHaHcomputerHcanHletHtheHat
tackerHplaceHtheseHonHcomputersHwhichHonceHinfectedHareHcalledHzombies.
AHcollectionHofHbotsHallHcontrolledHbyHoneHpersonHisHcalledHaHbotnet,HcommonlyHusedHforHDDOSHat
tacks
QUESTIONS WITH CORRECT ANSWERS 2025
VirusH-HCORRECTHANSWERH-
AHpieceHofHcodeHthatHisHcapableHofHcopyingHitselfHandHtypicallyHhasHaHdetrimentalHeffect,HsuchHasHc
orruptingHtheHsystemHorHdestroyingHdata
SocialHEngineeringH-HCORRECTHANSWERH-
Tricking/DeceivingHSomeoneHintoHgivingHyouHprivateHinformationHorHdata
BackdoorH-HCORRECTHANSWERH-AttackerHgetsHaccessHbyHusingHanHexploitHtoHaccessHtheHsystem
SpywareH-HCORRECTHANSWERH-
softwareHthatHobtainsHinformationHaboutHanotherHcomputer'sHactivitiesHwithoutHknowledgeHofHth
eHuser
SpearHPhishingHAttackH-HCORRECTHANSWERH-
isHanHemailHorHelectronicHcommunicationsHscamHtargetedHtowardsHaHspecificHindividual,Horganizat
ionHorHbusiness.HAlthoughHoftenHintendedHtoHstealHdataHforHmaliciousHpurposes,HcybercriminalsHm
ayHalsoHintendHtoHinstallHmalwareHonHaHtargetedHuser'sHcomputer.
DOSH-HCORRECTHANSWERH-
DenialHofHService:HanHattemptHtoHmakeHaHmachineHorHnetworkHresourceHunavailableHtoHitsHintend
edHusers,HsuchHasHtoHtemporarilyHorHindefinitelyHinterruptHorHsuspendHservicesHofHaHhostHconnect
edHtoHtheHInternet.
DDOSH-HCORRECTHANSWERH-
DistributedHDenialHofHService:HoccursHwhenHmultipleHsystemsHfloodHtheHbandwidthHorHresourcesH
ofHaHtargetedHsystem,HusuallyHoneHorHmoreHwebHservers.HSuchHanHattackHisHoftenHtheHresultHofHmu
ltipleHcompromisedHsystemsH(forHexample,HaHbotnet)HfloodingHtheHtargetedHsystemHwithHtraffic.
,BotnetH-HCORRECTHANSWERH-
aHnetworkHofHprivateHcomputersHinfectedHwithHmaliciousHsoftwareHandHcontrolledHasHaHgroupHwit
houtHtheHowners'Hknowledge,HusedHtoHsendHspamHmessages,HddosHattacks,HmineHforHcryptocurre
ncy,HandHmore
DumpsterHDivingH-HCORRECTHANSWERH-lookingHthroughHtrashHtoHobtainHsensitiveHinformation
RansomwareH-HCORRECTHANSWERH-
maliciousHsoftwareHthatHblocksHaccessHtoHcomputerHuntilHanHamountHofHmoneyHisHpaid
MalwareH-HCORRECTHANSWERH-
softwareHintendedHtoHharmHcomputers,Hnetworks,Hpeople,HorHbusinesses
Drive-byHDownloadH-HCORRECTHANSWERH-
DownloadsHinstalledHbyHjustHpassingHthroughHanHinfectedHwebpage
E-mailHfloodingH-HCORRECTHANSWERH-
sendingHmanyHemailsHtoHaHtargetHtoHfloodHtheHinboxHandHtakeHdownHtheHserver
TrojanHHorseH-HCORRECTHANSWERH-
aHvirusHdisguisedHasHrealHsoftware,HtoHmakeHitHappearHharmlessHsoHvictimsHdownloadHandHrunHit
WormH-HCORRECTHANSWERH-aHself-
replicatingHvirusHthatHdoesHnotHusuallyHalterHfilesHbutHresidesHinHactiveHmemoryHandHduplicatesHits
elf.HWormsHuseHpartsHofHanHoperatingHsystemHthatHareHautomaticHandHusuallyHinvisibleHtoHtheHuse
r.HItHisHcommonHforHwormsHtoHbeHnoticedHonlyHwhenHtheirHuncontrolledHreplicationHconsumesHsys
temHresources,HslowingHorHhaltingHotherHtasks.
DNSHspoofingH-HCORRECTHANSWERH-
alsoHreferredHtoHasHDNSHcacheHpoisoning,HisHaHformHofHcomputerHhackingHinHwhichHcorruptHDomai
, nHNameHSystemHdataHisHintroducedHintoHaHDNSHresolver'sHcache,HcausingHtheHnameHserverHtoHretu
rnHanHincorrectHIPHaddress,HwhichHresultsHinHdivertingHtrafficHtoHtheHattacker'sHcomputerH(orHanyHo
therHcomputer).
ScarewareH-HCORRECTHANSWERH-
MalwareHwhichHtricksHusersHintoHbuyingHfakeHantivirusHprotection
WhiteHHatH-HCORRECTHANSWERH-
AHhackerHwhoHdoesHgood.HTestsHsecurityHsystemsHwithHconsentHofHtheHowners.
BlackHHatH-HCORRECTHANSWERH-
AHhackerHwhoHusesHtheirHabilitiesHforHmaliciousHpurposesHsuchHasHbreachingHandHbypassingHintern
etHsecuirty.
CyberterroristH-HCORRECTHANSWERH-
SomeoneHwhoHusesHcomputersHtoHcauseHsevereHdamageHorHwidespreadHfearHinHsociety.
HacktivistH-HCORRECTHANSWERH-
aHcomputerHhackerHwhoseHactivityHisHaimedHatHpromotingHaHsocialHorHpoliticalHcause.
CyberespionageH-HCORRECTHANSWERH-
theHuseHofHcomputerHnetworksHtoHgainHillicitHaccessHtoHconfidentialHinformation,HtypicallyHthatHhel
dHbyHaHgovernmentHorHotherHorganization.
BotsH-HCORRECTHANSWERH-
BotsHcanHsendHspamHattacks,HdosHattacks,HandHothers.HMalwareHranHonHaHcomputerHcanHletHtheHat
tackerHplaceHtheseHonHcomputersHwhichHonceHinfectedHareHcalledHzombies.
AHcollectionHofHbotsHallHcontrolledHbyHoneHpersonHisHcalledHaHbotnet,HcommonlyHusedHforHDDOSHat
tacks