Types of Attacks
Cryptography
Cyber Security Tools
Scenarios
Random
100

This type of cyberattack involves tricking individuals into revealing confidential information, such as usernames and passwords.

What is phishing?

100

This is a secret code that is used to protect access to a computer, account, or other digital resource.

What is a password?

100

Coolmath Games is free for anyone to use. This is an example of:

What is the public domain?

100

Ehan stole Aakash's creative work and claimed it was his. This is an example of:

What is plaigarism?

100

This term refers to the practice of protecting computer systems, networks, and data from digital attacks, theft, and damage.

What is cybersecurity?

200

a type of cyber attack that involves overwhelming a computer system or network with a flood of traffic from multiple sources, making it unavailable to users.

What is a DDos Attack?

200

When a URL has this at the beginning, it means that the information entered into the site is encrypted.

What is "https"?

200

This security practice involves regularly updating software to fix known vulnerabilities.

What is patching?

200

Saisha was illegally copying DVDs and CDs. This is an example of:

What is piracy?

200

This is a common term used to describe a worm, digital virus, or other dangerous program.

What is malware?

300

A type of cyber attack that involves gaining unauthorized access to a computer system or network by exploiting a vulnerability or installing a hidden means of access.

What is a backdoor?

300

What type of encryption uses uses key pairs for encryption and decryption.

What is asymmetric encryption?

300

Companies consider cybersecurity when instructing employees with a policy on BYOD, which is short for?

What is Bring Your Own Device?

300

Sahasra's song is protected legally from being copied or used without my permission. This is an example of:

What is copyright?

300

Cybercrime went up 600% in this time period.

What is the Covid-19 pandemic

400

This type of cyber attack is designed to prevent users from accessing their own computer systems or files until a ransom is paid.

What is a ransomware attack?

400

Method in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.

What is Caesar Cipher?

400

This service allows users to remain anonymous, masking their identity/location and encrypts traffic.

What is a VPN?

400

Ari's favorite games are available for anyone to use. This is an example of:

What is public domain?

400

This generation is currently the most impacted by cybercrime.

(Gen Z, Millennials, Boomers, etc)

What are Millennials?

500

A type of cyber attack where the attacker intercepts communication between two parties to eavesdrop, steal information, or manipulate the conversation.

What is a "man-in-the-middle" attack?

500

One-way encryption process such that the encrypted value cannot be reverse-engineered to get to the original plain text.

What is hashing?

500

distributed ledger technology that provides a secure and transparent way to store and transfer data.

What is blockchain?

500

All of the CITs data is leaked. This is an example of:

What is a data breach?
500

Which cybersecurity group is better (Heath or Ehan)?

What is Ehan's grouop

M
e
n
u