What's in a Name?
Why Me?
Ipso Facto
Breach This!
100

This is the name of someone that breaks into computers, and applications

Hacker

100

False claims of romance, tech support offers, lottery plays, grandparents, shopping sites/cards are all considered to be:

a) Profiling

b) Cyber Intelligence

c) Scams

Scams

100

This is a security gap or flaw that can be exploited:

a) Gateway

b) Vulnerability

c) Break

Vulnerability

100

This is commonly used to secure remote and mobile communications:

a) Virtual Private Network (VPN)

b) Nailed-up Connection

c) Block Chain

Virtual Private Network or VPN

200

This is the name for a coworker that discloses confidential information:

a) Insider

b) Mole

c) Eyes

Insider

200

Term for AI generated image or voice of a person used to trick people into believing they are real for threats and intimidation:

a) Deep Fake

b) Big Fraud

c) Dup(licate)

Deep Fake

200

Approximate percentage of cybersecurity incidents that could be easily avoided:

a) 10%

b) 40%

C) 80%

80%

200

This common security product is used to block unwanted and malicious network traffic

a) Blocker

b) Guardian

c) Firewall

Firewall

400

This is the name of the location where cyber criminals can buy, sell, and share illegal or stolen data with little fear of being caught

Dark Web

400

  SURPRISE!

Is it traditionally considered bad luck to wear "white" after this holiday in the USA:

a) 4th of July

b) Labor Day

c) Halloween

Labor Day

400

This is continually the most cyber-attacked industry:

a) Healthcare

b) Government / Public

c) Manufacturing

Healthcare

400

This technology renders data unreadable unless a key is used to make it readable

Encryption

1000

Name of hacker group that uses this image of an historic person:                                                                             a) Zoro   b) Gladiator   c) Anonymous 

 

Anonymous

1000

When a person uses false information to create a fake identity, online accounts, images, etc. in order to scam or harass others:

a) Deep Fake

b) Catfishing

c) Espionage

Catfishing

1000

Most common password used globally - and it's very bad

a) 123456

b) qwerty

c) abcdef

123456

1000

  SURPRISE!

This is still the Number 1 selling album of all time with 47 million sold

Thriller

M
e
n
u