Cybersecurity Basics
Passwords
Regulations
Gone Phishing
Attack Vectors
100

This term refers to the protection of computer systems, networks, and data from theft, damage, or unauthorized access.

What is Cybersecurity?

100

This type of authentication method involves using a sequence of words or a sentence as a password, typically longer and more memorable than traditional passwords.

What is a passphrase?

100

This global standard outlines security requirements for organizations that handle credit card transactions to protect cardholder data from theft and fraud.

What is Payment Card Industry(PCI-DSS)?

100

This type of phishing is a targeted attack

What is spearphishing?

100

Software created by hackers with the intention of stealing data and/ or damaging our internal systems is known as.

What is malware?

200

A secure, private network that you can connect to over the internet.

What is a VPN?

200

What is the term for a tool that securely stores and manages passwords for various accounts?

What is a password manager or vault?

200

This U.S. legislation sets standards for the protection of sensitive patient health information and regulates its use and disclosure by healthcare providers and organizations.

What is Health Insurance Portability and Accountability Act(HIPAA)?

200

This type of phishing attack uses phone calls or voice messages to deceive individuals into providing sensitive information or performing certain actions.

What is vishing?

200

This type of malware replicates itself to spread to other computers.

What is a virus or worm?

300

This common cybersecurity threat involves tricking individuals into disclosing sensitive information or clicking on malicious links through deceptive emails or websites.

What is phishing?

300

The recommended minimum length for a strong password?

What is 12 characters?

300

This U.S. legislation mandates strict financial reporting and disclosure requirements for publicly traded companies to prevent accounting fraud and protect investors.

What is Sarbanes Oxley(SOX)?

300

DAILY DOUBLE! 

This variant targets high-ranking individuals or executives within an organization, aiming to steal sensitive information or gain unauthorized access to corporate networks.

300

This malware type is designed to block access to a computer system until a sum of money is paid.

What is ransomware?

400

This is the process of converting information or data into a code to prevent unauthorized access.

What is encryption? 

400

True or False: A strong password should include upper and lowercase letters, numbers and symbols.

What is True?

400

This California state law grants consumers greater control over their personal information held by businesses and imposes strict requirements on the collection, use, and sale of personal data.

What is the California Privacy Rights Act(CPRA)/ California Consumer Protection Act (CCPA)?

400

This type of phishing involves a SMS text message

What is smishing?

400

An approach to gain access to information through misrepresentation commonly by impersonation

What is social engineering?

500

 This security measure involves confirming the identity of users or systems before granting access to resources or data, typically through passwords, biometrics, or security tokens.

What is authentication?

500

This term refers to the set of rules and requirements established by an organization to govern the creation, usage, and protection of passwords by its employees or users

What is a password policy?

500

This European Union regulation governs the protection of personal data and privacy for individuals within the EU and European Economic Area.

What is General Data Protection Regulation(GDPR)?

500

This technique uses fraudulent emails that appear to come from a legitimate sender, such as a bank or government agency, to trick recipients into taking action.

What is email spoofing?

500

This type of attack floods a network or system with excessive traffic or requests, causing it to become slow, unresponsive, or unavailable to legitimate users.

What is a DDos attack?

M
e
n
u