Fill in the blank: As cybersecurity threats grow, many websites have evolved to include this increased security feature known as _____.
multifactor authentication
A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack, which is by far the most common cyberattack on the internet?
Phishing
When a password is limited strictly to numeric characters, the secret is often referred to as a PIN. What does that acronym stand for?
Personal Identification Number
Stored digital data is said to be “at” what if it’s inactive? (Hint: As opposed to being “in motion” when moving in a network)
Rest
If a friendly horse offers you something online that turns out to be malware, that's a cyberattack named for a siege on what ancient city?
Troy
The process of converting plaintext into another format that cannot be decoded without a key.
Encryption
What is a common method for attackers to guess passwords by trying many combinations quickly
Brute force attack
Being a ______ Ethical Hacker (CEH) means you’ve been trained to hack into your own system to test it for weaknesses and vulnerabilities.
Certified
Which term describes the underlying cybersecurity structure, as well as the technology and policies that support it?
Architecture
What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016?
A software that will secure data copied on a device placed into your computer.
disk or device encryption
What is the term for a simulated cyber-attack conducted by an organization to test its incident response capabilities?
Red team exercise
What type of security technology allows organizations to monitor and analyze user and system activities?
SIEM (Security Information and Event Management)
The global, hypermedia-based collection of information and services that is available on internet servers
World Wide Web
What “M” computer security company, founded by namesake John in 1987 before being acquired by Intel in 2011, is well known for its anti-virus software that is available to individual consumers?
McAfee
Employing a ______ strategy means that every user has to be authenticated no matter what. Whether someone is an authorized user in your organization or someone from outside of it, they have to be verified every time.
Zero trust
What was the first widely recognized computer virus that appeared in the early 1970s?
Creeper Virus
What is the term for the process of ensuring the authenticity and integrity of data through cryptographic means?
Data Integrity
Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. What is this called?
Denying services
What is the name of the software framework developed and maintained by Microsoft that was first built in the late 1990s and continues to primarily run on Windows machines with the C# language? Fun fact: this is a key piece of the Water Cooler Trivia stack.
NET
Named after a mythical creature, this type of cyber-attack involves infiltrating a network to stay undetected for an extended period
"TLS" (Transport Layer Security)
In what year did the Stuxnet worm, designed to target industrial control systems, become public knowledge?
2010
What is "the central hub responsible for monitoring, detecting, and responding to security incidents and threats within an organization's network"?
Security Operations Center
On June 7, 2021, the Department of Justice announced that it had seized approximately $2.3 million worth of what cryptocurrency from the Darkside Colonial Pipeline hackers?
bitcoin
Massimiliano Montoro developed a password cracking tool for Windows that was named after what biblical pair of brothers with a notable, fatal head-cracking in their story?
Cain and Abel