CIA
Cyber Ethics
Cyber Hygiene
Social Engineering
?
100

This stands for Confidentiality, Integrity, and Availability.

What is the CIA Triad?

100

Who leaked NSA files in 2013?

Snowden

100

You should do this regularly to software to keep it secure.




What is update it?

100

What biometric method uses finger patterns?

Fingerprints

100

What starts with T, ends with T, and has T in it?

A Tea Pot

200

What CIA principle ensures data remains unaltered

Integrity

200

What term describes using tech responsibly?


Ethics

200

What kind of encryption uses two keys?

Asymmetric

200

“Urgency,” “Authority,” and “Scarcity” are all examples of this manipulation technique.

What is social engineering?

200
What significant event in history took place on February 20th, 2002?

My birthday....

300

What type of attack targets system availability?

DDOS

300

A program that copies itself and spreads to other computers is called this.

What is a worm?


300

What security feature uses hashing + encryption to verify identity?

Digital Signature
300

This secure protocol is used for browsing websites and encrypting data in transit.

What is HTTPS?

300

What 2020 Netflix documentary series sparked renewed interest in big cat ownership and featured Joe Exotic?

Tiger King

400

This person tests systems for weaknesses (sometimes legally).

What is an ethical hacker (or white hat hacker)?

400

What kind of hacker legally tests systems?

White-Hat

400

This is what you should never click in an unknown or suspicious email.

What is a link or attachment?

400

This tool creates a secure, encrypted connection over the internet.

What is a VPN (Virtual Private Network)?

400

Who is the only athlete to play in both a Super Bowl and a World Series?

Deion Sanders

500

What principle limits user access to only what they need?

Least-privilege

500

These vulnerabilities exist in software that haven’t been patched yet.

What are zero-day vulnerabilities?

500

What encryption tool comes with Windows?

Bitlocker

500

This highly-targeted form of phishing is often aimed at specific people or companies.

What is spear phishing?

500

Who holds the record for the most home runs in a single MLB season?

Barry Bonds (73)

M
e
n
u