Cybersecurity Essentials
Web Form Security
Internet of Things
Business Cybersecurity
Video Games
100

A strong one of these is recommended to be a mix of letters, numbers, and symbols and changed regularly.

What is a password?

100

An encryption-based Internet security protocol.

What is an SSL, or Secure Sockets Layer?

100

The acronym that refers to the network of interconnected devices.

What is IoT?

100

A program designed to detect, thwart, and remove malicious software.

What is anti-virus?

100

This classic video game character is known for eating dots and avoiding ghosts in mazes.

What is Pac-Man?

200

This term refers to the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.

What is phishing?

200

What service helps distinguish between humans and bots, thereby enhancing web form security by preventing spam and abuse?

What is reCAPTCHA?

200

A wireless communication protocol is commonly used in IoT devices and cell phones for short-range communication.

What is bluetooth?

200

Converting data into a secure format that uses a pair of public and private keys for enhanced security.

What is asymmetric encryption?

200

Pokémon Red and Blue take place in this region based on a real life location in Japan.

What is Kanto?

300

The practice of tricking individuals into disclosing sensitive information through deceptive emails or websites.

What is ransomware?

300

This attack involves manipulating SQL code to view, modify, or delete data, posing one of the oldest threats to internet security.

What is a SQL injection attack?

300

Smart thermostats, security cameras, video doorbells, smart lights, smart appliances.

What are smart home devices?

300

Ensures that a business can continue operations even under a cyber attack.

What is business continuity?
300

The final boss in Zelda: Breath of the Wild.

Who is Calamity Ganon?

400

The acronym for the security measure that adds an extra layer of protection beyond passwords, often involving a code sent to a mobile device.

What is 2FA?

400

This type of attack allows malicious parties to inject harmful scripts into web application codes, potentially gaining access to sensitive customer data.

What is a cross-scripting attack?

400

Fitness trackers, smart watches, smart rings, glucose monitors, smart glasses.

What is wearable technology?

400

Regulations requiring businesses to take measures to protect sensitive information.

What is regulatory compliance?

400

The best selling video game of all time.

What is Minecraft?

500

This attack involves flooding a network or server with excessive requests from multiple devices to disrupt normal traffic.

What is a DDoS (Distributed Denial of Service) attack?

500

This regulation, enacted in 2018, mandates strong protection measures for online consumer data, similar to GDPR but specific to California.

What is CCPA? (California Consumer Privacy Act)

500

A small computer program that performs a specific task.

What is an applet?

500

The acronym for this 6 step response plan to a cybersecurity incident.

What is CIRP?

500

A speedrunner completed this game in 4:54. Mr. Choate's best attempt clocks in at 7:13.

What is Super Mario Bros.?

M
e
n
u