The practice of sending emails pretending to be from reputable companies in order to bait individuals into giving up information.
Phishing
True or False?
It is okay to use the same password for several accounts.
False
This famous character has a dog named Pluto.
Mickey Mouse
You should always read this before anything else on the image.
README
This type of malware downloads itself onto a device disguised as a legitimate application but is actually malicious.
Trojan Horse
The social engineering method in which attackers target high-level people such as presidents, CEOs, celebrities.
Whaling
Generally, how long your passwords should be.
10 letters
This island is famous for its stone statues resembling human heads.
Easter Island
The application you select to see the amount of points you have.
Scoring Report
This type of malware replicates with human interaction.
Virus
The social engineering method where the attacker baits people into giving up information by using their voice.
Vishing
A setting that should be turned on in Windows, which makes all passwords require upper, lower, and special characters.
Password Complexity.
Popular tourist attraction in Egypt.
Pyramids
You should always turn on this gate that facilitates what data goes into your device.
Firewall
Malware is almost always spread by this type of hacker.
Black Hat
The social engineering method that is performed through text messages.
Smishing
In Windows, the blue user-friendly interface that allows users to manage and adjust settings on a device or system with ease.
Control Panel
The Statue of Liberty was a gift from this country.
France
The amount of hours you get to compete tomorrow.
This type of malware replicates without human interaction.
Worm
This type of social engineering targets a specific person.
Spear-Phishing
This type of network is the most insecure.
Public
This desert is the largest hot desert in the world.
Sahara Desert
The state where Cyberpatriot finals are hosted.
This type of malware is installed on a device and proceeds to record all keys that are pressed in an attempt to find passwords.
Keylogger