Cyber Terms
Technology
Security Best Practices
Social Engineering
Types of Cyber Jobs
100

THIS TERM DESCIRBES A PERSON WHO BREAKS INTO COMPUTER SYSTEMS

A HACKER

100

THIS COMPUTER–GENERATED SIMULATION OF A 3D ENVIRONMENT ENABLES USERS TO EXPLORE AND INTERACT WITH A VIRTUAL SURROUNDING.

VIRTUAL REALITY

100

THIS PRACTICE INVOLVES CREATING COMPLEX ACCESS CREDENTIALS BY MIXING LETTERS, NUMBERS, AND SYMBOLS

STRONG PASSWORDS

100

THIS COMMON SOCIAL ENGINEERING ATTACK INVOLVES TRICKING INDIVIDUALS INTO REVEALING SENSITIVE INFORMATION

PHISHING

100

SOLVE PROBLEMS WITH IMAGINATION AND LOGIC; SYNTHESIZE AND APPLY KNOWLEDGE OR UNDERSTANDING FROM DIFFERENT REALMS.

INVESTIGATOR

200

PII IS DATA USED TO IDENTIFY THE IDENTITY OF AN INDIVIDUAL. WHAT DOES PII STAND FOR?

PERSONALLY IDENTIFIABLE INFORMATION

200

TRUE OR FALSE:

CLOUD COMPUTING IS THE DELIVERY OF DIFFERENT SERVICES THROUGH THE INTERNET.

TRUE

200

THIS ADDS AN EXTRA LAYER OF SECURITY BEYOND PASSWORDS, OFTEN INVOLVING A CODE SENT TO YOUR PHONE

TWO-FACTOR AUTHENTICATION

(2FA)

200

IN THIS TYPE OF ATTACK, AN UNAUTHORIZED INDIVIDUAL GAINS PHYSICAL ACCESS TO A RESTRICTED AREA BY FOLLOWING AN AUTHORIZED PERSON

TAILGATING

200

GATHER AND STUDY INFORMATION TO INDETIFY PATTERNS AND MAKE MEANING; SIFT OUT DISTRACTIONS AND IRRELEVANT INFORMATION TO HOME IN ON THE KEY ISSUE OR PROBLEM.

ANALYST

300

OFTEN REFERRED TO AS JUNK EMAIL, RECEIVING UNWANTED/UNSOLICITED MESSAGES IS KNOWN AS WHAT? 

SPAM

300

AI IS THE SIMULATION OF HUMAN INTELLIGENCE IN MACHINES THAT ARE PROGRAMMED TO THINK AND ACT LIKE HUMANS. WHAT DOES AI STAND FOR?

ARTIFICIAL INTELLIGENCE

300

WHICH SECURITY PRACTICE INVOLVES EDUCATING INDIVIDUALS ABOUT COMMON CYBER THREATS AND HOW TO RECOGNIZE AND RESPOND TO THEM? 


A. DATA ENCRYPTION
B. SECURITY AWARENESS TRAINING

C. SOFTWARE UPDATES
D. BACKUP & RECOVERY

B. SECURITY AWARENESS TRAINING

300

TRUE OR FALSE

SOCIAL ENGINEERING RELIES SOLELY ON TECHNICAL VULNERABILITIES TO EXPLOIT SYSTEMS

FALSE

300

FIND THE WEAK POINTS OR VULNERABILITIES OF A SYSTEM; IDENTIFY FLAWS OR MISTAKES AND POINT TOWARDS SOLUTIONS.

PROTECTOR

400

THIS SPECIAL FEATURE ALLOWS PARENTS TO RESTRICT ACESS TO WHAT TYPE OF CONTENT THEIR CHILDREN CAN VIEW.

PARENTAL CONTROLS

400

IN DEC 2023, THIS GAMING SYSTEM SOLD OVER 50 MILLION IN SALES – EVEN OUTSELLING THE XBOX SERIES X , 3 TO 1.

PLAYSTATION 5 (PS5)

400

THIS TERM DESCRIBES REGULARLY UPDATING SOFTWARE TO PROTECT AGAINST KNOWN VULNERABILITIES

SOFTWARE UPDATES

400

WHICH OF THE FOLLOWING IS NOT A POTENTIAL CONSEQUENCE OF FALLING VICTIM TO A SOCIAL ENGINEERING ATTACK?


A. FINANCIAL LOSS              
B. IDENTITY THEFT

C.IMPROVED SECURITY POSTURE
D. REPUTATION DAMAGE

 

C. IMPROVED SECURITY POSTURE

400

USE ABSTRACT REASONING OR LOGIC TO ANSWER QUESTIONS OR BUILD SOLUTIONS; A GRASP OF MATHEMATICAL AND SPATIAL RELATIONSHIPS HELPS GREATLY.

PROGRAMMER

500

“I’VE PERMANENTLY BLOCKED YOU FROM ACCESSING YOUR PERSONAL INFORMATION. IF YOU WANT IT BACK, YOU’LL HAVE TO PAY ME.” THIS IS AN EXAMPLE OF: 

A. RANSOMWARE

B. SPYWARE  

C. WORMS

A. RANSOMWARE

500

TRUE OR FALSE:

TELEWORK IS DEFINED AS THE USE OF DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGIES TO ACCESS HEALTH CARE SERVICES REMOTELY AND MANAGE YOUR HEALTH CARE

FALSE

500

THIS INVOLVES CREATING DUPLICATE COPIES OF DATA TO ENSURE IT CAN BE RECOVERED AFTER AN INCIDENT

BACKUP & RECOVERY

500

WHAT IS THE BEST DEFENSE AGAINST SOCIAL ENGINEERING TACTICS?


A. REGULARLY UPDATING ANTIVIRUS SOFTWARE
B. ENCRYPTING ALL DATA ON A NETWORK

C. INCREASING FIREWALL STRENGTH  

D. TRAINING EMPLOYEES TO RECOGNIZE AND REPORT SUSPICIOUS ACTIVITY

 

D. TRAINING EMPLOYEES TO RECOGNIZE AND REPORT SUSPICIOUS ACTIVITY

500

ORGANIZE TASKS, CONNECT SPECIFIC PROBLEMS TO LARGER CONTEXTS OF SECURITY NEEDS, COORDINATE AND LEAD TEAMS.

MANAGER

M
e
n
u