What is the term for a malicious software designed to harm or exploit any programmable device or network?
What is Malware?
Which social media platform experienced a major data breach in 2018, affecting over 50 million user accounts?
What is Facebook?
What is the name of the software that scans and removes viruses from a computer?
Antivirus
Which U.S. law requires healthcare organizations to protect patient information?
HIPAA (Health Insurance Portability and Accountability Act)
What is the recommended minimum length for a strong password?
12 characters
What type of cyber attack involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity?
What is Phishing?
What was the name of the hacking group responsible for the 2014 Sony Pictures hack?
Who is Guardians of Peace?
What cybersecurity tool is used to monitor and control incoming and outgoing network traffic based on predetermined security rules?
Firewall
What does GDPR stand for?
General Data Protection Regulation
What practice involves regularly updating software to fix vulnerabilities and improve security?
Patch management
What type of cyber attack involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity?
What is WannaCry?
In 2013, which major retailer suffered a data breach that exposed credit and debit card information of 40 million customers?
Target
What tool is used to detect and prevent unauthorized access to a network?
Intrusion Detection System (IDS)
What is the name of the California law that enhances privacy rights and consumer protection for residents of California?
CCPA (California Consumer Privacy Act)
What is the term for a security measure that requires two forms of identification before granting access to an account or system?
Two-factor authentication (2FA)
What type of malware replicates itself to spread to other computers, often without any user intervention?
What is a worm?
Which ride-sharing company experienced a data breach in 2016, exposing the personal information of 57 million users and drivers?
Uber
What is the name of the open-source tool used for network discovery and security auditing, often utilized by cybersecurity professionals?
Nmap (Network Mapper)
What is the name of the European regulation that aims to protect individuals' privacy and personal data in electronic communications?
ePrivacy Regulation (also known as the "Cookie Law")
What is the term for regularly changing passwords to reduce the risk of unauthorized access?
Password rotation
What is the name of the malware that infected over 500,000 routers worldwide in 2018, believed to be created by a state-sponsored group?
What is VPNFilter?
Which major hotel chain experienced a data breach in 2018, affecting approximately 500 million guests?
Marriott International
What tool is used to encrypt internet traffic and protect online privacy, often used to access restricted content?
Virtual Private Network (VPN)
Which U.S. law, enacted in 2002, aims to protect investors by improving the accuracy and reliability of corporate disclosures?
Sarbanes-Oxley Act (SOX)
What practice involves regularly reviewing and updating user access permissions to ensure that only authorized individuals have access to sensitive information?
Access control management