Cyberattacks
Acronyms
Cyber Principles
Companies
Misc.
100

A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack is by far the most common cyberattack on the internet?

Phishing

100

What “B” is a type of identity-based data whose examples include fingerprints, DNA, and handwritten text?

Biometric

100

What term is used for a testing environment in a computer system in which new or untested software or coding can be run securely? In a different context, this term refers to a children’s play area.

Sandbox


100

Deepwatch is a cybersecurity company that has offers threat management with real-time monitoring since 2015. It is headquartered in what state that's home to Rocky Mountain National Park?

Colorado


100

Doug Engelbart was the inventor of what computer accessory? The first one was made from wood.

Mouse

200

A cyberattack in which the attacker intercepts and alters data as it is transmitted between two parties is known as a Man-in-the-middle attack - what do the letters MitM stand for?

Man-in-the-middle

200

In the context of password generation, what does the acronym OTP stand for? The term dynamic password is often used synonymously with OTP.

One-time Password

200

he "man without a head" is the emblem of what Guy Fawkes-lovin' hacker group that reemerged in 2020?

Anonymous

200

In 2022, which government entity got told off for requiring American citizens to verify their identity with a facial recognition program (ID.me) before they could get their tax records?

Internal Revenue Serives

200

You probably are more familiar with the discipline from watching “CSI,” but which scientific field can also be applied to computing—specifically, to investigate how technology is used in criminal activity?

Forensics

300

Although cartoon bears might like it, a hacker might not enjoy being tricked into hacking what sweet-sounding, eight-letter decoy computer system that's purposely made to attract attackers to gain insight into how to decrease cybersecurity threats?

Honeypot

300

When a password is limited strictly to numeric characters, the secret is often referred to as a PIN. What does that acronym stand for?

Personal identification Number

300

One way to intercept internet or phone conversations through covert means takes its name from an actual physical interference with an important cable to overhear others. Today, the seven-letter term is still used in relation to listen to something that one should not hear (such as a password). What is this term?

Wiretap

300

What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016?

LinkedIn


300

If you want to make sense of ciphertext, you’ll need a key to decrypt it. What’s the name for the readable, plain language text it turns into?

Plaintext


400

If a friendly horse offers you something online that turns out to be malware, that's a cyberattack named for a siege on what ancient city?

Troy

400

It sounds like a row of safety plugs, but SSL is actually an Internet encryption protocol. What is SSL an acronym for?

Secure Sockets Layer

400

What is the 6-letter term for a group of computers that is networked together and used by hackers to steal information?

Botnet

400

What company, founded in 2003 by Dean Drako in Campbell, CA, offers security on networks and clouds? Its name is the same as a dangerous fish chronicled in a 1977 song by the band Heart.

Barracuda

400

The four principle wireless encryption standards available at most access points are WPA, WPA2, WPA3, and which less-secure fourth option?

WEP

500

Titan Rain was a series of attacks on U.S. computers that started in 2003. The hackers gained access to defense networks at places like Lockheed Martin and NASA. Which country did the attacks originate from?

China

500

Founded by Austrian activist, attorney, and author Max Schrems, the acronym in the non-profit organization NOYB – European Center for Digital Rights stands for what phrase that seemingly advises others to mind their own and to not be nosy?

None Of Your Business

500

A concept borrowed from ol’ Westerns, a “black hat” hacker has nefarious purposes (like stealing data to sell), while a “white hat” hacker is often doing their work on behalf of their employer (or at least, with their permission). Which third hacker with what color hat is sort of between the two—they don’t have permission to hack, but they also don’t exploit any vulnerabilities they find?

Grey

500

What “M” cybersecurity Technologies company, based out of Commerce, CA, offers managed IT services across the country? Its name is also a plural of a measurement of 5,280 feet.

Miles Technology

500

What color team are the operators who try to block a mock attack on their system?

Blue

M
e
n
u