"P" Soup
I Got You!
WTF
Attacks
200

This is a very common term for a malicious email

Phishing or Phish

200

Term used to describe impersonating another person's identity

a) Cloning

b) Mirroring

c) Spoofing

Spoofing

200

Responding to questions on social media about your likes, history, family, data can be used by cybercriminals to attack you and is called:

a) A Breach

b) Interactive Exposure

c) Social Engineering

Social Engineering

200

This historic attack left many with tears in their eyes

a) WannaCry

b) Diced Onion

c) Blackeye

WannaCry

400

The term is used to describe a person's ability to keep their information confidential and not divulged without their permission.

Private or Privacy

400

New technology that uses fingerprints, Iris Scan. or even DNA to verify your identify

a) Genometric Analysis

b) Quantum Computing

c) Biometrics

Biometrics

400

Term for an exploit that has never been used before?

a) Early Bird

b) Zero-Day

c) Blitz

Zero-Day

400

This type of cyberattack will make data and files unreadable unless money is paid to release the data

a) Spyware

b) Ransomware

c) Hijacking

Ransomware

1000

Term for data that could be used to identify a person

a) Protected Information (PI)

b) Personable Identifiable Information (PII)

C) Restricted Information (CI)

Personable Identifiable Information (PII)

1000

Common technology uses a puzzle or game to prove that you are human

a) Certificate

b) Password

c) CAPTCHA

CAPTCHA

1000

This type of currency has enabled hacking to become very profitable

Bitcoin or crypto currency


1000

This type of attack happens due to vulnerabilities, or flaws in a vendor's products or processes:

a) Outside Intrusion

b) Supply Chain Attack

c) Manufacturer Exploit


Supply Chain Attack

2000

The term for an update, fix, or improvement to an existing software application that prevents a vulnerability from being exploited:

a) Plug

b) Plat

c) Patch

Patch

2000

What hackers are most interested in about you:

a) Social Media Accounts

b) Work Credentials (Username and Password)

c) Health Information

Work Credentials (Username and Password)

2000

This cybersecurity company recently caused the biggest global outage in history

a) Cisco Systems

b) Crowdstrike

c) ZScaler

Crowdstrike

2000

This attack is used to shutdown a website by bombarding it with massive amounts of requests:

a) Distributed Denial of Service (DDoS)

b) Shut It Down (SID)

c) You Are Blocked (YAB)

DDoS, DoS, or (Distributed) Denial of Service

M
e
n
u