Cyber Threats
Famous Hacks
Cybersecurity Tools
Cyber Laws and Regulations
Cybersecurity Best Practices
100

What is the term for a malicious software designed to harm or exploit any programmable device or network?

What is Malware?

100

Which social media platform experienced a major data breach in 2018, affecting over 50 million user accounts?

What is Facebook?

100

What is the name of the software that scans and removes viruses from a computer?

Antivirus

100

Which U.S. law requires healthcare organizations to protect patient information?

HIPAA (Health Insurance Portability and Accountability Act)

100

What is the recommended minimum length for a strong password?

12 characters

200

What type of cyber attack involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity?

What is Phishing?

200

What was the name of the hacking group responsible for the 2014 Sony Pictures hack?

Who is Guardians of Peace?

200

What cybersecurity tool is used to monitor and control incoming and outgoing network traffic based on predetermined security rules?

Firewall

200

What does GDPR stand for?

General Data Protection Regulation

200

What practice involves regularly updating software to fix vulnerabilities and improve security?

Patch management

300

What type of cyber attack involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity?

What is WannaCry?

300

 In 2013, which major retailer suffered a data breach that exposed credit and debit card information of 40 million customers?

Target

300

What tool is used to detect and prevent unauthorized access to a network?

Intrusion Detection System (IDS)

300

What is the name of the California law that enhances privacy rights and consumer protection for residents of California?

CCPA (California Consumer Privacy Act)

300

What is the term for a security measure that requires two forms of identification before granting access to an account or system?

 Two-factor authentication (2FA)

400

What type of malware replicates itself to spread to other computers, often without any user intervention?

What is a worm?

400

Which ride-sharing company experienced a data breach in 2016, exposing the personal information of 57 million users and drivers?

Uber

400

What is the name of the open-source tool used for network discovery and security auditing, often utilized by cybersecurity professionals?

Nmap (Network Mapper)

400

What is the name of the European regulation that aims to protect individuals' privacy and personal data in electronic communications?

 ePrivacy Regulation (also known as the "Cookie Law")

400

What is the term for regularly changing passwords to reduce the risk of unauthorized access?

Password rotation

500

What is the name of the malware that infected over 500,000 routers worldwide in 2018, believed to be created by a state-sponsored group?

What is VPNFilter? 

500

 Which major hotel chain experienced a data breach in 2018, affecting approximately 500 million guests?

Marriott International

500

What tool is used to encrypt internet traffic and protect online privacy, often used to access restricted content?

Virtual Private Network (VPN)

500

Which U.S. law, enacted in 2002, aims to protect investors by improving the accuracy and reliability of corporate disclosures?

Sarbanes-Oxley Act (SOX)

500

What practice involves regularly reviewing and updating user access permissions to ensure that only authorized individuals have access to sensitive information?

Access control management

M
e
n
u