This acronym stands for the process of verifying a user’s identity, often via passwords, biometrics, or tokens.
What is authentication?
Where did the server come from
Engineering lab/ robotics lab
Honey my wifi isn't working
Let’s check if it’s just your device or the whole house. Try turning the Wi-Fi off and on again on your phone or computer. If that doesn’t work, we might need to unplug your router for 30 seconds and plug it back in.
This 2015 TV series follows a hacker named Elliot as he battles corrupt corporations and his own mind.
What is Mr. Robot?
This is the number of layers in the OSI model.
7
This type of software acts like a digital guard dog, monitoring network traffic for suspicious activity.
What is an Intrusion Detection System (IDS)?
What was the first drawing done on the far window done by Alexis
Bee hive with bees for the honey pot
The face e book isn't working, I need to see what my grandkids are doing
- help them through the sign in process
- redownload the app/ update
- needs to be re-added to the homescreen
What was that bee movie we watched called?
The Beekeeper
This kind of phishing targets a specific high-value individual, often using detailed personal information.
Spear is personal information and whaling is targeting a CEO
This cybersecurity concept means regularly testing your defenses by simulating attacks.
What is penetration testing (pen testing)?
What are the cyber professors names?
Aaron Rodriguez, Adam Zeiner, Dr. Becote, Sarah Bunce, Dan Wilkins
If you say Aaron Jones you lose 5 points
This prince in Egypt needs moneys and asked me to send him money through a link, can you help me with this please
Answer- just no
They aren't real
Explain why clicking on random links is unsafe and are usually (most of the time) scams
Who is Edward Snowden and why did he move?
He is a former CIA/NSA hacker who got kicked out of the US and moved to Russia since he stole secret documents (based off a true story)
When your computer starts moving slower than a turtle on a treadmill, it might be infected with this “slow and steady” malware.
This can be any malware that affects the computers resources. plus trojan horse is just the dilivery method
This security measure encrypts your web traffic, shown by “https://” and a padlock in your browser’s address bar.
What is SSL/TLS encryption?
What is the misspelled word on the its all about cyber window
I can't hear you! Speak up please!
Let’s make sure the volume is turned up and not muted. I’ll also check if the speakers or headphones are plugged in properly.
What is the bestest estest estestsssssss scooby doo movie of all time that was released in 2001 that shocased Phantom Virus
Scooby-Doo and the Cyber Chase
This sneaky method hides malicious code inside an innocent-looking file—kind of like the Trojan horse, but geekier.
What is steganography?
This class of attacks abuses weaknesses in the way TLS certificates are validated, allowing attackers to impersonate legitimate websites by exploiting flaws like improper hostname verification or trusted CA compromises.
What is a TLS/SSL Man-in-the-Middle (MITM) Attack?
List the MITRE ATT&CK® Framework
Reconnaissance
Resource Development
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Command and Control (C2)
Exfiltration
Impact
Hey yo kiddo, if my computer says it's using Wi-Fi, does that mean it's safe?
Not necessarily. Just because you're connected to Wi-Fi doesn't mean the network is secure. If you're on a public or unencrypted Wi-Fi (like in a coffee shop or airport), your data could be intercepted by attackers. For safety, always use password-protected networks and consider using a VPN to encrypt your traffic.
In the book 'The Girl with the Dragon Tattoo (2005), what was Lisbeth Salander's profession?
She was a skilled hacker, The novel touches on themes of hacking, surveillance, and cybercrime.
This phishing method doesn’t use email at all—instead, attackers create fake websites or login portals to trick users into entering credentials.
What is pharming or spoofed websites?