Definition
Attacks
Tools
Trivia
True/False
100
Overview of the security requirements of an organization and describes security controls in place for meeting those requirements

WISP (Written Information Security Plan)

100

Emails that are fake and want you to click on a link to give up personal information.

Phishing

100

Software that detects and prevents malicious malware on your devices

Antivirus or Antimalware software

100

How much time does it take for someone to clone your voice using voice AI technology?

2 minutes

100

The more we share about ourselves online, the easier it is for criminals to personalize scams to make them more believable.

True.

200

A strategy used to exploit a human mind's vulnerabilities to gain access to sensitive information.

Social Engineering

200

Malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action

Ransomware

200

A security system that monitors and controls incoming and outgoing network traffic

Firewall

200

What is one of the best ways to keep your online account safe?

Multi-factor authentication

200

Passwords should have no more than 12 characters and are not required to have numbers or special characters.

False.

300

Any combination of a person's name and address, phone number, credit card, account number, social security number, date of birth, etc.

Personally Identifiable Information (PII)

300

An attack against a specific individual that utiiizes messaging that appeals to that person.

Spear Phishing

300

Tool to manage and generate complex passwords securely for different accounts

Password manager

300

What % of cyber attacks occur due to human error?

95%

300

Slack is completely secure and we don't have to worry about phishing in Slack.

False.

400

A method of access control by which users must present multiple, separate pieces of information in order to access a system.

Multi-factor authentication

400

Records the activities of the user and transmits the information to the person who wrote the malware.

Spyware

400
A service that allows users to remain anonymous, masking their identity/location and encrypts traffic

VPN (Virtual Private Network)  (TunnelBear for CV)

400

How much money was lost in 2024 due to cyber crime?

$16.6 billion.  A 33% increase from 2023.

400

A strong password is a good first defense for protecting your account but is best when combined with multi-factor authentication.

True

500

When a url has this at the beginning, it means that the information entered into the site is encrypted.

https

500

A type of attack that targets an organization's C-level officials to reveal sensitive information.

Whaling

500

The weakest link in every computer system.  The one person who, through thoughtlessness, unawareness or accident, can cause loss of work products through deletion, corruption or improperly safeguarding data.

Me/You

500

Up to 98% of cyber attacks involve some form of social engineering.  Name the different types of social engineering attacks.

Phishing, Spear phishing, Smishing, Vishing, Whaling, Baiting, Quid Pro Quo, Honey Trapping

500

Social engineering is about distraction and misdrection.

True.

M
e
n
u