Technology
Policy And standards
Risk Management
Security Breach
Surprise Me!
100
The first commercial GUI computer.
What is Apple Lisa ?
100
_______________ is/are the most commonly used security technology at large companies. A. Intrusion-detection systems B. Mass Survillance C. Biometrics D. Antivirus software
What is D.Antivirus software?
100
Programming that serves to "glue together" or mediate between two separate, and usually already existing, programs is known as _______________. A. front-line software B. software handshaking C. middleware D. back-line software
What is Middleware?
100
A person who seeks and exploits weaknesses in a computer system or network. Might be a white hat or a black hat.
Who is a Hacker?
100
R2D2 and C3PO.
What are The names of the two famous droids in the Star Wars movies?
200
The technologically advanced humanoid robot Asimo is made by ______, a car manufacturer.
What did Honda make?
200
A(n) _______________ is a standard set of rules and procedures for the control of communication in a network. A. amplification B. algorithm C. protocols D. Guidelines.
What are Network Protocols (C)?
200
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________. A. sniffing B. hacking C. phishing D. spoofing
What is Spoofing?
200
The first step in Security Awareness is being able to ________ a security threat. A. Avoid B. Recognize C. Challenge D. Log
What is B. Recognize
200
Pseudonym for the individual who wrote the Bitcoin white paper.
Who is Satoshi Nakamoto?
300
An Operating system whose name means “I am because of you”.
What is meaning of 'Ubuntu;?
300
When receiving an email from an unknown contact that has an attachment, you should: A. Open the attachment to view its contents B. Forward the email to your personal email account so you can open it at home ;Delete the email C. Forward the email to your co-workers to allow them to open the attachment first D. Report Phishing
What is D?
300
Result of any action or series of actions that prevents any part of an information system from functioning
What is Denial Of Service?
300
This award recognized the millions of people who anonymously contribute to the Internet by Time Magazine.
Who Got Time Person of the Year in 2006?
400
A method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism - typically at least two of the following categories: knowledge (something they know); possession (something they have), and inherence (something they are).
What is Multi-factor authentication (MFA) ?
400
Q. _______________ refers to sifting through a company's garbage/shredder to find information to help break into their computers. A. Dumpster Diving B. Password cracker C. Back door D. Sniffer
What is Dumpster diving?
400
Steve Chen, Chad Hurley, Jawed Karim founded a revolutionary Social Media platform.
Who founded Youtube?
500
Q. Which of them is not a Password Policy A. Minimun 8 characters B. Atleast 1 special character C. Combination of Lower and upper case D. Atleast 1 numeral
What is D?
500
This social media-spawned phrase was the Oxford Dictionary's 2013 word of the year.
What is Selfie?
M
e
n
u