Virus and Malware
Social Engineering
Data Security
Threat Actors
Mystery
100

A type of malware that prevents or limits users from accessing their system, either by locking the system's screen, or by locking and encrypting the users' files and demanding a payment.

What is Ransomware?

100

Mass messages sent as an attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email, text message, chat apps, or phone calls.

What is Phishing?

100

A secret word or phrase that must be used to gain access to a computer system or service.

What is a Password? 

100

A type of cyberattack that originating from an individual within an organization.

What is an Insider Threat?

100

A method where access to a website or account is only granted after the user presents two or more factors (password, SMS code, etc.)

What is Multi-factor Authentication? (or Two-factor Authentication)?

200

A type of malware that disguises itself as legitimate code or software.

What is a Trojan?

200

A type of malicious campaign that targets a specific individual or group, and often will include information known to be of interest, or urgent to the target. It often involves fake stories and fraudulent scenarios.

What is Spear Phishing?

200

The process of scrambling messages or information in such a way that only authorized parties can read it.

What is Encryption? 

200

A person who breaks into a computer system for politically or socially motivated purposes.

Who is a Hacktivist?

200

The use of physical characteristics such as fingerprints, voices, retinas, and facial features to authenticate users.

What is Biometric Authentication?

300

A type of malware that is able to replicate itself without user activation and spreads through a network.

What is a Worm?

300

A tactic used to lure victims into knowingly or unwittingly giving up sensitive information or downloading malicious code by tempting them with a valuable offer or even a valuable object.

What is Baiting?

300

A 3-letter acronym used as a guiding model in information security.

What is CIA?

300

These are well run groups of offenders who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial gain.

Who are Organized Crime groups?

300

The act of obtaining confidential information by directly observing someone entering it, usually by looking over them.

What is Shoulder Surfing?

400

The most common vulnerability threat to mobile devices.

What is Adware?

400

A type of breach where an attacker gains access to a facility by following an authorized person into an area containing sensitive information or valuable assets.

What is Tailgating (or Piggybacking)?

400

In real life, it can slow the spread of flames and smoke; in digital life, it blocks unauthorized access to your private data.

What is Firewall?

400

They are structured groups funded by governments and dedicated to stealing sensitive data, gathering confidential information, or disrupting another government’s critical infrastructure.

Who are State-Sponsored Actors (Nation-State Actors)?

400

***DOUBLE JEOPARDY***

If you are leaving a windows-based PC unattended, you can use Ctrl-Alt-Delete + the lock button to lock your screen, but there is another, shorter key sequence to do the same thing.

What is press the Windows key + the letter L?

500

***DOUBLE JEOPARDY***

Name the country that has the highest number of malware infected computers in the world as of 2024.

What is China? 

500

A threat actor creates a fake, but plausible scenario for the victim and poses as the right person to resolve it.

What is Pretexting?

500

Cryptic letter combos and pesky login puzzles, these two examples are tools used to descern real users from bots.

What is CAPTCHA?

500

A type of hacker that is opportunistic and motivated by boredom.

What are Thrill Seekers?

500

An information security concept used to control access to sensitive data by dictating the role of a user.

What is Principle of Least Privilege (PoLP)


M
e
n
u