Cyber Basics
Cyber Attacks
Online Safety
Cyber Tools
Fun
100

Term for a secret word or phrase used to gain access to a system

A Password

100

An attack where the hacker demands payment to unlock your files

Ransomware

100

Always do this before clicking on links in suspicious emails

Verify the source

100

A secure connection between your device and the internet is called this

VPN

100

What's the oldest Rivalry in the NFL 

Chicago bears and Green Bay Packers

200

This software helps protect your computer from malicious programs

Antivirus software

200

Overwhelming a server with traffic to shut it down

DDoS attack

200

This kind of authentication uses two different forms of verification 

Two-factor authentication

200

This kind of file logs events and actions on systems for review

Log File

200

What was the first sport in the U.S

Lacrosse

300

The kind of network is used at coffee shops or airports and often lacks secerity

Public WI-FI

300

An attack where someone secretly intercepts communication

Man-in-the-middle attack

300

Avoid doing this with your password especially with friends

Sharing it

300

These tools detect unathorized access attempts or unusual activity

IDS

300

Nevada's state flower

Sage Brush

400

This type of attack involves sending fraudulent emails to steal personal information

Phishing

400

Exploiting software flaws before vendor knows about them

Zero-day attack

400

You should do this regularly to all your software and devices

Update them

400

This type of tool checks for vulnerability in applications or systems

Vulnerability scanner

400

When was the Chicago bears first SuperBowl win 

1985

500

The acronym stands for a set of rules that protect the confidentiality of data on the internet

HTTPS

500

An attack where users are tricked into executing malicious code via a fake website

Drive-by download attack

500

Using the same password across many sites increases this kind of risk

Credential stuffing

500

This device inspects network traffic and enforces severity policies 

Firewall

500

what ended in the 1927

1926

M
e
n
u