Cyber 1
Hodgepodge 1
Cyber 2
Hodgepodge 2
Cyber 3
100

The generic term for computer programs that can wreak havoc on your devices

What is Malware? 

100

The "common information security framework" for the federal government and its contractors.

What is RMF?

100

This type of information must be encrypted when transmitted.

What is PII?

100

Don't be shy--of Disney's 7 dwarfs he's alphabetically first

Who is Bashful?

100

The psychological manipulation of people into performing actions or divulging confidential information.

What is Social Engineering?

200

The term for malicious software which collects personal information from your devices.

What is Spyware?

200

Jumpman was the original name for the hero of this game where he was a carpenter.

Who is Donkey Kong?

200

Encryption are the encryption standards that will protect information sent over a wireless network

What are WPA2 and WPA3?
200

These should be stored in the fridge pointed end down & should not be eaten raw; boiled or poached is okay.

What are eggs?

200

A combination of the words “robot” and “network”. It is a number of Internet-connected devices, each of which is running one or more bots.

What is BotNet?
300

An attempt to gather personal information, generally for malicious reasons, by posing as trusted contacts or companies.

What is phishing?

300

The Air Force is the same age (and shares a birthday with) what other governmental organization.

What is the CIA?

300

A website with a site certificate is one that uses encryption; this letter after HTTP is one sign of it.

What is "S"?

300

Of Japan's 4 main islands the one that doesn't end in U

What is Hokkaido?

300

A metaphorical name given to a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks such as sending spam emails, launch DoS attacks of one sort or another under remote direction.

What is Zombie?
400

Companies consider cyber security when instructing employees with a policy on BYOD, short for this


What is Bring Your Own Device?

400
He advocated for a separate air force, strategic bombing, development of aircraft for the future of all U.S. forces, and is considered the "father" of the Air Force.

Who is William "Billy" Mitchell?

400

The number of steps in the Risk Management Framework.

What is 6?

400

A creator of this game got the idea while looking at a pizza that was missing a slice.

What is "Pac-Man"?

400

Software that infects computer networks and mobile devices to hold your data hostage until you send the attackers money.

What is Ransomware?

500

The type of hacker referred to by a colorful bit of headgear helpfully tests computer systems for vulnerability.

What is White Hat?

500

The city where the cartoon The Simpons lived.

Springfield

500

Famous OS developed for Hackers and software testers designed for digital forensics and penetration testing.

What is Kali Linux?

500
It's a military rank of Tso, or Tao, a 19th century warrior after whom a chicken dish was named.

What is General?

500

If SSL stands for Secure Socket Layer, TLS stands for

What is Transport Layer Security?

M
e
n
u