It's a mix!
To do or not to do? Scenarios!
Which is it?
Random Computer Trivia!
Basic Terminology
100

An attacker impersonates a company executive (e.g., CEO) and emails an employee in accounts payable, instructing them to make an urgent wire transfer to a new vendor. Which is it? 

This is an example of phishing. 

100

You've gotten an email from an unknown source with a link that it encourages you to click. What should you do?

Don't click the link or attachment!

100

Type of software specifically designed to gain access or damage a computer without the knowledge of the owner.

Malware! 

100

This is the recommended minimum length for a strong password, according to most cybersecurity best practices.

At least 16 characters! You should go for length > complexity. Don't reuse computers! Add MFA! 

100

This term refers to the software designed to protect against viruses and malicious software.

It's antivirus software. 

200

You've been sent a text message that tells you to click a link to view important information about an upcoming USPS delivery.

This is a phishing attack. 

200

You've gotten a message from your friend on social media with a link that states, "OMG, look at this pic of you!?" What should you do?

It's possible that your friend's account has been hacked. If you click that link, it could take you to a fake login page that's designed to steal your account password. 

200

A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.

Ransomware! 

200

What does multi-factor authentication require or 2-factor identification???

It requires two or more different factors, such as a password and then a smartphone/token. 

200

This is unauthorized access to a computer system's data.

This would be hacking. 

300
True or false: Someone can't monitor your activity via your camera and microphone.

That's false. Unfortunately, there is spyware that could track your location, record audio, or take photos. 

300

BuildRight Construction's accounting department notices their computers running slowly with unexpected pop-ups appearing frequently. Their IT team discovers spyware has been installed, stealing keystrokes and monitoring network activity. Sensitive client information and financial data may have been compromised. What steps should they take immediately? List at least 1! 

  • Isolate affected computers from the network to prevent further data theft 

  • Run comprehensive antivirus and anti-malware scans on all affected systems 

  • Use specialized spyware removal tools to clean infected computers 

  • Change all passwords, especially for accounting and financial systems 

  • Review financial records and network logs to determine what data was stolen

  • Notify customers and partners whose information may have been compromised

  • Contact law enforcement to report the incident

  • Implement network monitoring to detect ongoing suspicious activity 

300

An attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email.

Phishing!

300

How much did the first Apple-1 computer sell for in 1976? 

"The first Apple-1 computers were sold for $666.66 in 1976. Forty-five years later, a still-functioning one has sold for $400,000 [in 2021)" (NPR). 

300

This is the process of converting information into a code to prevent unauthorized access.

It would be encryption. 

400

True or false: Only large companies are targeted by malware.

That's false. Anyone can be a target: individuals, small businesses, etc. 

400

GreenLeaf Retail receives an email that appears to be from their payment processor, asking all employees to re-verify their login credentials due to a "security update." Fifty employees click the link and enter their usernames and passwords. Two days later, the company notices unauthorized transactions totaling $100,000. What should the company do now? List at least 1-2 steps! 

  • Notify all affected employees to change their passwords immediately 

  • Alert the payment processor about the fraudulent email and unauthorized transactions

  • Contact their bank and payment processor to freeze accounts and dispute the unauthorized charges

  • Review transaction logs to identify all fraudulent activity

  • Notify customers whose payment information may have been compromised

  • File a report with law enforcement

  • Check for signs of additional system compromise (hackers may have installed malware or spyware)

  • Monitor accounts closely for further unauthorized activity

400

This type of malware, often disguised as legitimate software, installs itself without the user’s consent and can give an attacker remote control over an infected system.

It's a trojan horse! 

400

Who is the first known computer programmer?

"English mathematician Ada Lovelace has been called the first computer programmer. She was an associate of Charles Babbage, for whose prototype of a digital computer she created a program in the 19th century" (Britannica). 

400

This device is used to block unauthorized access while permitting outward communication

The term would be firewall. 

500

True or false: The first webcam was created to monitor a coffee pot. 

That's true. 

"The Trojan Room coffee pot was a coffee machine located in the Computer Laboratory of the University of Cambridge, England. It was the subject of the world's first webcam, created by Quentin Stafford-Fraser and Paul Jardetzky in 1991.


To save people working in the building the disappointment of finding the coffee machine empty after making the trip to the room, a camera was set up providing a live picture of the coffee pot to all desktop computers on the office network. After the camera was connected to the Internet a few years later, the coffee pot gained international renown as a feature of the fledgling World Wide Web, until being retired in 2001" (Wikipedia). 

500

TechFlow Solutions, a software development company with 150 employees, discovers that all their project files are encrypted. A message appears on their screens demanding $500,000 in cryptocurrency within 48 hours or the files will be deleted. The company has no recent backups. What should the company do next? List at least 1 step. 

  • Isolate all infected systems from the network immediately to prevent the ransomware from spreading to other computers 

  • Document the attack (take screenshots of the ransom message, note the time and date)

  • Contact law enforcement and report the incident [1]

  • Do NOT pay the ransom—paying does not guarantee file recovery and funds criminal activity [1]

  • Notify employees and customers that their data may have been compromised

  • Contact their insurance company if they have cyber insurance

  • Consult with IT professionals or a cybersecurity firm for recovery assistance

500

This type of malware is a self-replicating program that spreads across networks by exploiting vulnerabilities, often affecting systems without the need for user interaction.

It's a worm! 

500

True or false: computers were once an occupation and not a machine. 

That's true: "The term 'computer', in use from the early 17th century (the first known written reference dates from 1613),[1] meant 'one who computes': a person performing mathematical calculations, before electronic calculators became available. Alan Turing described the 'human computer' as someone who is 'supposed to be following fixed rules; he has no authority to deviate from them in any detail.'" (Wikipedia). 

500

What is the tool that creates a secure and encrypted tunnel between your device and a remote server, used to mask your real IP address and location to protect your privacy.

It's a VPN! 

M
e
n
u