A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack is by far the most common cyberattack on the internet?
Phishing
What “B” is a type of identity-based data whose examples include fingerprints, DNA, and handwritten text?
Biometric
What term is used for a testing environment in a computer system in which new or untested software or coding can be run securely? In a different context, this term refers to a children’s play area.
Sandbox
Deepwatch is a cybersecurity company that has offers threat management with real-time monitoring since 2015. It is headquartered in what state that's home to Rocky Mountain National Park?
Colorado
Doug Engelbart was the inventor of what computer accessory? The first one was made from wood.
Mouse
A cyberattack in which the attacker intercepts and alters data as it is transmitted between two parties is known as a Man-in-the-middle attack - what do the letters MitM stand for?
Man-in-the-middle
In the context of password generation, what does the acronym OTP stand for? The term dynamic password is often used synonymously with OTP.
One-time Password
he "man without a head" is the emblem of what Guy Fawkes-lovin' hacker group that reemerged in 2020?
Anonymous
In 2022, which government entity got told off for requiring American citizens to verify their identity with a facial recognition program (ID.me) before they could get their tax records?
Internal Revenue Serives
You probably are more familiar with the discipline from watching “CSI,” but which scientific field can also be applied to computing—specifically, to investigate how technology is used in criminal activity?
Forensics
Although cartoon bears might like it, a hacker might not enjoy being tricked into hacking what sweet-sounding, eight-letter decoy computer system that's purposely made to attract attackers to gain insight into how to decrease cybersecurity threats?
Honeypot
When a password is limited strictly to numeric characters, the secret is often referred to as a PIN. What does that acronym stand for?
Personal identification Number
One way to intercept internet or phone conversations through covert means takes its name from an actual physical interference with an important cable to overhear others. Today, the seven-letter term is still used in relation to listen to something that one should not hear (such as a password). What is this term?
Wiretap
What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016?
If you want to make sense of ciphertext, you’ll need a key to decrypt it. What’s the name for the readable, plain language text it turns into?
Plaintext
If a friendly horse offers you something online that turns out to be malware, that's a cyberattack named for a siege on what ancient city?
Troy
It sounds like a row of safety plugs, but SSL is actually an Internet encryption protocol. What is SSL an acronym for?
Secure Sockets Layer
What is the 6-letter term for a group of computers that is networked together and used by hackers to steal information?
Botnet
What company, founded in 2003 by Dean Drako in Campbell, CA, offers security on networks and clouds? Its name is the same as a dangerous fish chronicled in a 1977 song by the band Heart.
Barracuda
The four principle wireless encryption standards available at most access points are WPA, WPA2, WPA3, and which less-secure fourth option?
WEP
Titan Rain was a series of attacks on U.S. computers that started in 2003. The hackers gained access to defense networks at places like Lockheed Martin and NASA. Which country did the attacks originate from?
China
Founded by Austrian activist, attorney, and author Max Schrems, the acronym in the non-profit organization NOYB – European Center for Digital Rights stands for what phrase that seemingly advises others to mind their own and to not be nosy?
None Of Your Business
A concept borrowed from ol’ Westerns, a “black hat” hacker has nefarious purposes (like stealing data to sell), while a “white hat” hacker is often doing their work on behalf of their employer (or at least, with their permission). Which third hacker with what color hat is sort of between the two—they don’t have permission to hack, but they also don’t exploit any vulnerabilities they find?
Grey
What “M” cybersecurity Technologies company, based out of Commerce, CA, offers managed IT services across the country? Its name is also a plural of a measurement of 5,280 feet.
Miles Technology
What color team are the operators who try to block a mock attack on their system?
Blue