Cyber Fundamentals
CISA
Availability
The Enemy
Internet
100

The practice of protecting computer systems, networks, and data from digital attacks and unauthorized access.

What is cybersecurity?

100

What does CISA stand for?

What is the Cybersecurity and Infrastructure Security Agency

100

What is a password?

What is a secret word, phrase, or a combination of characters used to verify a user's identity and grant access to a computer system, website, or other secured resource?

100

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity.

Who are hackers?

100

The ability of computer systems to perform tasks that typically require human intelligence, such as learning, problem-solving, and decision-making.  

What is AI (Artificial Intelligence)?

200

Type of cyberattack where criminals try to trick individuals into revealing sensitive information, such as usernames, passwords, and financial details, by impersonating a trustworthy entity?

What is phishing?

200

When was CISA made into an agency?

What is 2018?

200
An identifier that uniquely tracks actions to individuals.
What is an Account? (or Login ID)
200
an attempt by hackers to damage or destroy a computer network or system.


What is a cyber attack?

200

System software that manages computer hardware and software resources, providing common services for computer programs.

What is an OS (operating system)?

300

Smartphones, smart speakers, smart cars, smart cards, smart thermostats, smart doorbells, smart locks, smart refrigerators, tablets, smartwatches, smart bands, smart keychains, smart glasses, TV

Smart Devices/IoT

300

What is to lead the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure.?

What is CISA's Mission?

300

What does MFA/2FA stand for?

What is Multi-Factor Authentication/2 Factor Authentication?

300

individuals or groups who use computers and the internet to commit illegal activities for financial gain, political purposes, or other malicious objectives.

Who are organized crime groups or cybercriminals?

300

Edge, Chrome and Safari are types of what ?

What is a internet browser?

400

What is a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.

What is Wi-Fi?

400

CISA's mission expands across what three primary areas?

What is cybersecurity, infrastructure security, and emergency communications.?

400

Focused on mitigating, preparing for, responding to, and recovering from the effects of disasters and emergencies. It involves coordinating resources and responsibilities across various levels of government, non-governmental organizations, and the private sector to protect communities

What is Emergency Management?

400

the use of technology to harass, threaten, embarrass, or target another person.

What is cyberbullying?

400
Software designed to detect and destroy computer viruses.


What is Anti-virus?

500

What is any data that can be used to identify, contact, or locate a specific individual.

What is PII? 

500

We have ten of them

How many Regions does CISA cover ?

500

What is used for MFA/2FA?

What is a cell phone/email/key fob?

500

The weakest link in every computer system. One who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.

Who are people?

500

Global network of billions of computers and other electronic devices.

What is the internet?

M
e
n
u