Fundamentals
Threat Types
Security Measures
Frameworks
Applications
Final Jeopardy
200

This is the practice of protecting networks and data from unauthorized access.

What is Cybersecurity

200

This malware demands payment to release your data

What is Ransomware?

200

This term refers to any action or device that lessens vulnerabilities.

What is a control?

200

The NIST Framework is Mandatory. T or F?

What is False?

200

This sector uses cybersecurity to safeguard personal health information, often targeted by ransomware.

What is Healthcare?

200

This 2021 cyberattack targeted the Colonial oil pipeline system, causing widespread fuel shortages on the East Coast. What was the method of attack utilized by the group Darkside on the pipeline?

What is Ransomware?

400

This term describes a weakness in a system that can be exploited.

What is a Vulnerability?

400

This attack floods a service with excessive traffic to disrupt normal operations.

What is DDoS?

400

The basic action of regularly updating software and systems.

What is patching?

400

This organization advocates for best practices in internet security

What is CIS? (Center for Internet Security)

400

Cybersecurity measures in this sector aim to secure transactions and protect against identity theft and fraud

What is the Financial Sector?

600

In cybersecurity, this is the practice ensuring that data is accurate and unaltered.

What is Integrity?

600

This technique might involve a fake prince asking for money.

What is Phishing?

600

What are "best practice recommendations within the CIS Controls"?

What is a safeguard?

600

This model supports communities in developing cybersecurity responses.

What is the CCSMM?

600

This work from professionals in the cybersecurity sector is critical for preventing disruptions in power grids and factories

What is the Industrial Sector?

800

Which principle restricts data viewing to high-clearance eyes only?

What is confidentiality?

800

This involves unsecure websites without secure protocols.

What is HTTP?

800

This critical security control ensures that even if data is intercepted, it remains unreadable without a special key.

 What is encryption?

800

Protect, Respond, and Identify are 3 of the 5 core NIST Functions. Name the other 2.

What are Detect and Recover?

800

Risk refers to the potential for loss or damage when a ___ exploits a vulnerability.

What is a Threat?

1000

These are the three main aspects of any cybersecurity strategy.

What is PPT? (People, Process, Technology)

1000

This self-replicating cyber threat spreads without user action.

What is a Worm?

1000

Among the best practices to protect against pervasive threats, this type of software scans and removes malicious programs.

What is Anti-Malware?

1000

This NIST aids organizations in understanding and managing their cybersecurity ____.

What is Risk?

1000

Name a federal agency associated with defining Cybersecurity practices

What is the Cybersecurity and Infrastructure Security Agency (CISA)?

M
e
n
u