This stands for Confidentiality, Integrity, and Availability.
What is the CIA Triad?
Who leaked NSA files in 2013?
Snowden
You should do this regularly to software to keep it secure.
What is update it?
What biometric method uses finger patterns?
Fingerprints
What starts with T, ends with T, and has T in it?
A Tea Pot
What CIA principle ensures data remains unaltered
Integrity
What term describes using tech responsibly?
Ethics
What kind of encryption uses two keys?
Asymmetric
“Urgency,” “Authority,” and “Scarcity” are all examples of this manipulation technique.
What is social engineering?
My birthday....
What type of attack targets system availability?
DDOS
A program that copies itself and spreads to other computers is called this.
What is a worm?
What security feature uses hashing + encryption to verify identity?
This secure protocol is used for browsing websites and encrypting data in transit.
What is HTTPS?
What 2020 Netflix documentary series sparked renewed interest in big cat ownership and featured Joe Exotic?
Tiger King
This person tests systems for weaknesses (sometimes legally).
What is an ethical hacker (or white hat hacker)?
What kind of hacker legally tests systems?
White-Hat
This is what you should never click in an unknown or suspicious email.
What is a link or attachment?
This tool creates a secure, encrypted connection over the internet.
What is a VPN (Virtual Private Network)?
Who is the only athlete to play in both a Super Bowl and a World Series?
Deion Sanders
What principle limits user access to only what they need?
Least-privilege
These vulnerabilities exist in software that haven’t been patched yet.
What are zero-day vulnerabilities?
What encryption tool comes with Windows?
Bitlocker
This highly-targeted form of phishing is often aimed at specific people or companies.
What is spear phishing?
Who holds the record for the most home runs in a single MLB season?
Barry Bonds (73)