Phishing
Malware
Incident Response
100

What do most phishing emails try to steal from you?

Information

100

What is software that harms your computer called?

Malware

100

What’s the first thing you should do when you realize there’s a security issue?

Identify

200

What kind of subject line should you be suspicious of in an email?

Urgency

200

Which of these is not a type of malware: Virus, Worm, Encryption, or Trojan?

Encryption

200

What do you call the step where you stop a security threat from spreading?

Containment

300

What type of phishing targets specific people rather than a large group?

Spear Phishing

300

What is a dangerous vulnerability that the software maker doesn't know about yet?

Zero-day

300

What is the main goal of an incident response plan?

Recovery

400

What extra security layer can protect you even if someone gets your password?

Authentication

400

What type of malware holds your files hostage until you pay?

Ransomware

400

What’s the first thing you should do after containing an attack to minimize further damage?

Eradication

500

What tactic do attackers use to make phishing emails seem more believable?

Trust

500

What type of malware runs in your computer's memory, making it harder to detect?

Fileless

500

What do you analyze after an incident to figure out how to prevent it from happening again?

Root-cause

M
e
n
u