Basic Concepts
Types of Attacks
Cyber Hygiene
Careers
Future Trends
100

What is the process of converting data into a code to prevent unauthorized access?

Encryption

100

What is the name of an attack where an attacker sends fake emails to steal personal information?

Phishing

100

What should you regularly update to ensure you have the latest security patches?

Software/Application

100

Who monitors and protects an organization’s network from cyber threats?

Cybersecurity Analyst

100

What technology is being used to enhance threat detection and response in cybersecurity?

Artificial Intelligence (AI)

200

What term describes the practice of verifying the identity of a user or system?

Authentication

200

What type of attack involves overwhelming a system with traffic to make it unavailable?

Denial-of-Service (DoS) attack

200

What practice involves being cautious about the websites you visit and the links you click?

Safe Browsing

200

Who simulates cyber attacks to find vulnerabilities in systems?

Penetration Tester

200

What emerging technology has the potential to break traditional encryption methods?

Quantum Computing

300

What security system monitors and controls incoming and outgoing network traffic?

Firewall

300

What attack involves an attacker secretly relaying and possibly altering communication between two parties?

Man-in-the-Middle (MITM) attack

300

What adds an extra layer of security by requiring two forms of verification?

Two-factor authentication

300

Who advises organizations on how to protect their systems and data?

Security Consultant

300

As the number of Internet of Things (IoT) devices grows, what becomes increasingly important?

IoT security

400

Name a software that detects and removes malicious software from a computer.

Antivirus software

400

Name a type of malware that encrypts data and demands a ransom for its release.

Ransomware

400

What should you create using a mix of upper and lower case letters, numbers, and special characters?

Strong password
400

Who investigates cyber crimes and analyzes digital evidence?

Forensic Computer Analyst

400

What kind of changes are governments implementing to improve cybersecurity standards?

Regulatory changes and compliance

500

What is the term for a flaw, bug, or misconfiguration in a system that can be exploited?

Vulnerability

500

What term describes the manipulation of someone into giving up personal information?

Social engineering 

500

What practice involves making copies of important files to prevent data loss?

Data backup

500

Who oversees an organization’s entire cybersecurity strategy?

Chief Information Security Officer (CISO)

500

What term describes the coordinated effort to respond to and mitigate cybersecurity incidents?

Incident response

M
e
n
u