What is the process of converting data into a code to prevent unauthorized access?
Encryption
What is the name of an attack where an attacker sends fake emails to steal personal information?
Phishing
What should you regularly update to ensure you have the latest security patches?
Software/Application
Who monitors and protects an organization’s network from cyber threats?
Cybersecurity Analyst
What technology is being used to enhance threat detection and response in cybersecurity?
Artificial Intelligence (AI)
What term describes the practice of verifying the identity of a user or system?
Authentication
What type of attack involves overwhelming a system with traffic to make it unavailable?
Denial-of-Service (DoS) attack
What practice involves being cautious about the websites you visit and the links you click?
Safe Browsing
Who simulates cyber attacks to find vulnerabilities in systems?
Penetration Tester
What emerging technology has the potential to break traditional encryption methods?
Quantum Computing
What security system monitors and controls incoming and outgoing network traffic?
Firewall
What attack involves an attacker secretly relaying and possibly altering communication between two parties?
Man-in-the-Middle (MITM) attack
What adds an extra layer of security by requiring two forms of verification?
Two-factor authentication
Who advises organizations on how to protect their systems and data?
Security Consultant
As the number of Internet of Things (IoT) devices grows, what becomes increasingly important?
IoT security
Name a software that detects and removes malicious software from a computer.
Antivirus software
Name a type of malware that encrypts data and demands a ransom for its release.
Ransomware
What should you create using a mix of upper and lower case letters, numbers, and special characters?
Who investigates cyber crimes and analyzes digital evidence?
Forensic Computer Analyst
What kind of changes are governments implementing to improve cybersecurity standards?
Regulatory changes and compliance
What is the term for a flaw, bug, or misconfiguration in a system that can be exploited?
Vulnerability
What term describes the manipulation of someone into giving up personal information?
Social engineering
What practice involves making copies of important files to prevent data loss?
Data backup
Who oversees an organization’s entire cybersecurity strategy?
Chief Information Security Officer (CISO)
What term describes the coordinated effort to respond to and mitigate cybersecurity incidents?
Incident response