Personal Data
Authentication
Encryption
Malware Mayhem
SOCIAL ENGINEERING
100

This acronym stands for information that can be used to identify a specific individual.

What is PII (Personally Identifiable Information)?

100

This is the most common form of authentication that requires something you know.

What is a username and password?

100

This type of encryption uses the same key to both encrypt and decrypt data.

What is symmetric encryption?

100

This type of malicious software replicates itself and spreads to other computers.

What is a virus?

100

This attack involves sending fraudulent emails that appear to come from reputable sources to steal sensitive information.

What is phishing?

200

This type of information includes your full name, Social Security number, and home address.

What is personally identifiable information (or PII)?

200

This security method requires two or more verification factors to gain access to an account.

What is multifactor authentication (MFA) or two-factor authentication (2FA)?

200

This type of encryption uses two different keys - one public and one private.

What is asymmetric encryption (or public-key encryption)?

200

This type of malware appears to be legitimate software but contains hidden malicious code.

What is a Trojan horse (or Trojan)?

200

This social engineering technique involves pretending to be someone else to gain unauthorized access.

What is impersonation?

300

When companies combine your browsing history, purchase records, and location data, they create this type of comprehensive profile.

What is a detailed digital profile (or data profile)? 

300

This process determines what resources a user can access after they've been authenticated.

What is authorization?

300

 In public-key encryption, this key can be shared openly while the other must be kept secret.

What is the public key?

300

This malware encrypts your files and demands payment for the decryption key.

What is ransomware?

300

This attack involves creating fake websites or emails that look identical to legitimate ones.

What is spoofing?

400

This practice involves websites tracking your online behavior across multiple sites to build advertising profiles.

What is cross-site tracking (or online data collection)?

400

This is the security practice of tracking and recording user activities on a system.

What is accounting (or auditing)?

400

This is the main advantage of symmetric encryption over asymmetric encryption.

What is speed (or efficiency)?

400

This type of software secretly monitors and records your keystrokes.

What is a keylogger?

400

This social engineering attack involves leaving infected USB drives or other media for victims to find and use.

What is baiting?

500

These are three examples of data that companies might collect about you without you realizing it.

What are location data, browsing history, search queries, device information, or social media activity? (Accept any three)

500

These are the three main categories of authentication factors: something you know, something you have, and this.

What is something you are (biometrics)?

500

This is the main advantage of asymmetric encryption over symmetric encryption.

What is secure key distribution (or not needing to share secret keys)?

500

These are three preventative measures you can take to protect against malware.

What are antivirus software, keeping software updated, avoiding suspicious downloads, using firewalls, or backing up data? (Accept any three)

500

This type of false information is deliberately spread to deceive people, often through social media.

What are hoaxes?

M
e
n
u