Security Intro
Attacks
Malicious Software
Authentication
CIA/AAA
Encryption
**Random**
100

The foundation of Cybersecurity is these three principles referred to the CIA Triad.

What is Confidentiality, Integrity, and Availability.

100

This is the term for the passive gathering of information about a potential victim. 

What is Reconnaissance?

100

Software designed to infiltrate or damage a computer system without the owner's consent or knowledge.

What is Malware?

100

This access controls method gives only specified groups access to specific data. Ex. Grant backup administrators access to all servers on the network.

What is Role Based Access Control? RBAC






100

This aspect of cybersecurity is being compromised when someone is shoulder surfing and snooping on you. 

What is confidentiality?

100

What is the strongest wireless encryption standard commonly utilized to protect WiFi networks?

What is WPA2?

100

This is the chemical symbol for gold.

What is Au?

200

Identifies a set of rules or standards that define personal behaviors.

What is a code of ethics?

200

This is when n attacker intercepts communications between two network hosts by impersonating each host.

What is a Man-in-the-Middle attack? 

200

Software that records information about a PC and its user. It is used to describe software that the user has acknowledged can record information about their habits.

What is Adware?

200

This authentication type include things like PINs, Passwords, or Pattern locks. This is sometimes referred to as SOMETHING YOU KNOW.

What is Type 1 Authentication?

200

This is a way of proving you are who you say you are.

What is Authentication?

200

This is a name of any early encryption that was developed by a leader to send messages during war.

What is Caesar Cipher?

200

This is the term for a group of flamingos.

What is a Flamboyance?

300

This is the name of Microsoft's anti-malware product.

What is Windows Defender?

300

This is the best countermeasure against social engineering.

What is Training? User Training?

300

Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.

What is Virus?

300

This is feature of type 3 authentication it is the recognition of individuals based on their biological characteristics.

What is Biometrics?

300

This is a means of keeping track of who does what on a computer or network. 

What is Accounting?

300

The process of encoding or translating data into another form so that only the intended recipient can decrypt and read the data.

What is Encryption?

300

This app has a green owl as the mascot?

What is Duolingo?

400

This sets expectations for user privacy when using company resources. 

What is acceptable use policy?

400

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks

What is Zombie/botnet?

400

Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment.

What is Ransomware?

400

This authentication type include things such as key fobs, hardware tokens, one-time passcode, and usb keys. This is sometimes referred to as SOMETHING YOU HAVE.

What is Type 2 Authentication?

400

This aspect of cybersecurity is being compromised when the cleaning crew accidentally disconnects the ethernet cable leading to a crucial database.

What is a Availability?

400

A form of encryption that uses only one key to encrypt and decrypt a file. This is a less secure form of encryption.

What is Symmetric Encryption?

400

According to the 1993 live-action movie, Super Mario Bros. this is the last name of the Mario and Luigi.

What is Mario?

500

Which Internet protocol is used to transmit encrypted data?

What is HTTPS?

500

An email-based social engineering attack in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

What is phishing?

500

A type of malware that replicates between processes in system memory and can spread over client/server network connections.

What is a Worm?

500

Requiring two or more types of authentication is referred to as this.

What is Multifactor Authentication?

500

In cybersecurity, this term is used to describe the process of specifying which actions a user can perform.

What is Authorization?

500

A way for two computers to verify their identity before they exchange information.

What is a security certificate?

500

This is the first Disney princess to have a tattoo.

Who is Pocahontas?

600

This is a device that controls the flow of network traffic to protect systems from unauthorized network connections. 

What is a Firewall?

600

An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.

What is a Denial of Service? DOS/DDOS

600

This is malicious software or hardware that can record user keystrokes. 

What is a keylogger?

600

This authentication type include things such as your fingerprints, handprints, retinal patterns, face, or voice. This is sometimes referred to as SOMETHING YOU ARE.

What is Type 3 Authentication?

600

This aspect of cybersecurity is concerned with making sure data is not manipulated and changed while in transit or at rest.

What is a integrity?

600

A form of encryption in which both parties involved have a public key and a private key. By using complex mathematical formulas, the computer generates the keys in a way that any file encrypted with the public key can only be decrypted by the private key.

What is Asymmetric Encryption?

600

This is the official name for the “prove you’re not a robot” tests that websites sometimes require.

What are CAPTCHAs?

700

This term is a key component of fault tolerance. It is the practice of duplicating components of a system to help tolerate failures.

What is Redundancy?

700

A social engineering tactic where a team communicates, whether directly or indirectly, a lie or half-truth in order to get someone to believe a falsehood

What is Pretexting?

700

This is a malicious software program hidden within an innocuous-seeming piece of software. Usually, it is used to try to compromise the security of the target computer.

What is a Trojan?

700

This is a method that allows you to log into one system and have access to other related systems.

What is Single sign-on?

700

We use this term to describe the inability to refute responsibility

What is Non-Repudiation?

700

This is the term we use for data that is in a persistent storage medium, such as a hard drive or optical disc. 

What is Data at Rest?

700

This is the longest running animated American TV show.

What is The Simpsons?

M
e
n
u