What do most phishing emails try to steal from you?
Information
What is software that harms your computer called?
Malware
What’s the first thing you should do when you realize there’s a security issue?
Identify
What kind of subject line should you be suspicious of in an email?
Urgency
Which of these is not a type of malware: Virus, Worm, Encryption, or Trojan?
Encryption
What do you call the step where you stop a security threat from spreading?
Containment
What type of phishing targets specific people rather than a large group?
Spear Phishing
What is a dangerous vulnerability that the software maker doesn't know about yet?
Zero-day
What is the main goal of an incident response plan?
Recovery
What extra security layer can protect you even if someone gets your password?
Authentication
What type of malware holds your files hostage until you pay?
Ransomware
What’s the first thing you should do after containing an attack to minimize further damage?
Eradication
What tactic do attackers use to make phishing emails seem more believable?
Trust
What type of malware runs in your computer's memory, making it harder to detect?
Fileless
What do you analyze after an incident to figure out how to prevent it from happening again?
Root-cause