Cyber Safe Beginnings
Privacy and Online
Etiquette
Network Defenders
Defense in Depth
Operation Cyber Defender
100

What is the motto we learned on Day 1 for staying safe online?

Stop and Think Before You Click!

100

What is personal data?

Any information that can be used to identify who we are

100

What is the difference between a LAN and a WAN?

A LAN connects devices in a small local area like a classroom. A WAN connects multiple LANs across large distances like the internet

100

What is Defense in Depth?

Using multiple layers of security so that if one layer fails, the next one holds

100

In Cyber Defender, what do the berries represent in the real world?

Our data

200

What do we call it when small pieces of harmless information are combined together to create something dangerous?

The Mosaic Effect

200

Name two red flags we should look for on a public online profile

Any two of the following: real name visible, age in bio, location displayed, schedule sharing, open DMs, public account setting, linked profiles

200

What is encryption?

Scrambling a message so that only the right person with the right key can read it

200

What is the difference between a DoS attack and a DDoS attack?

A DoS attack comes from one single source. A DDoS attack comes from many different sources at the same time

200

In Cyber Defender, what type of cyber attack do the Bees represent?

A DDoS attack

300

What are four things that make a password strong?

Length, uppercase and lowercase letters, numbers, and special characters

300

What is a typosquat?

A fake website designed to look like a real one with just one character changed in the URL

300

What are the three types of authentication?

Something we know, something we have, and something we are

300

What is the difference between signature-based and behavior-based antivirus detection?

Signature-based checks files against a database of known malware. Behavior-based watches how programs act and flags anything suspicious, even if it has never been seen before

300

What is a honeypot in cybersecurity, and how was it represented in Cyber Defender?

A honeypot is a decoy system designed to lure attackers. In Cyber Defender it was represented by the Flowers which lured Bees away from the path

400

What is it called when someone tricks us into giving away our personal information by pretending to be someone we trust?

Social Engineering

400

What is an AI Hallucination?

When an AI generates information that sounds confident but is actually incorrect or made up

400

What is the 3-2-1 backup method?

3 copies of the data, stored on 2 different types of storage, with 1 copy kept offsite

400

What is a Vigenère Cipher and how is it different from a Caesar Cipher?

A Vigenère Cipher uses a keyword to create a repeating shift pattern instead of one single shift number like the Caesar Cipher

400

What is a Pigpen Cipher?

A substitution cipher where each letter is replaced with a symbol based on its position inside a grid. It was used by the Freemasons in the 18th century

500

What is a dictionary attack?

When a hacker uses a list of common passwords and tries them automatically to break into an account

500

What is AI Literacy and why is it important?

Understanding what AI actually is, how it generates content, and why it sometimes gets things wrong so we can think critically about everything we see online

500

Name the five roles on an Incident Response Team and what each one does.

Analyst monitors the network, Forensics investigates damage, Engineer deploys security changes, Communications Specialist informs the public, Legal Expert ensures compliance with laws

500

What is message integrity and how does a checksum help protect it?

Message integrity means making sure a message has not been tampered with. A checksum is a calculated number based on the message content. If even one character changes the checksum will not match, instantly revealing that the message was altered

500

What is a Transposition Cipher and how is it different from a Substitution Cipher?

A Transposition Cipher rearranges the letters of a message into a different order without replacing them. A Substitution Cipher replaces each letter or character with something else entirely

M
e
n
u