What to do if someone is cyberbullying you or someone you know?
What is tell a parent or trusted adult
What is one example of PII?
Date of Birth, Email Address, Physical Address, Social Security Number, Phone Number
What is a Trojan Horse?
What is malware that is disguised as a good thing
What kind of competition is CyberPatriot?
What is a Defensive Competition
What is Brute Force Cracking?
What is the most common OS (Operating System)?
What is Windows
What do you do if you get a text/email that is a scam?
What is delete it and block whoever sent it if it is a text
What is Phishing?
What is a deceptive/malware email that an attacker sends in an attempt to get PII from a person
What is the first thing you do during the process opening an image?
What is Check the Checksum
How long should your password be?
What is 10-12 characters long
What does CPU stand for?
What is Central Processing Unit
What is one of the easiest ways to tell if a website is secure?
What is look for a 's' after 'http' in the url
What is Social Engineering?
What is Manipulating a person into giving up personal information
What do you do first after putting in your UID?
What is Read the README
What is a Keylogger?
What is a piece of malware that tracks everything a user types
What is a Checksum?
What is a mathematical formula based on the data contained in a file
What is the word for how to act properly online?
What is Netiquette
What is a Logic Bomb?
It is a piece of malware that doesn't do anything until certain conditions are met
What is the application you use a lot in Windows?
What is Control Panel
What is Authentication?
What is The process of verifying a user's identity
What does a Switch do?
What is a Switch controls traffic within a network
How often should you change your password?
What is 90 days or 3 months
What is a Worm?
What is a piece of malware that spreads and infects devices without needing human assistance
What is the application that is used the most in Ubuntu?
What is Terminal
What does the CIA Triad stand for?
What is Confidentiality, Integrity, and Availability