The foundation of Cybersecurity is these three principles referred to the CIA Triad.
What is Confidentiality, Integrity, and Availability.
This is the term for the passive gathering of information about a potential victim.
What is Reconnaissance?
Software designed to infiltrate or damage a computer system without the owner's consent or knowledge.
What is Malware?
This access controls method gives only specified groups access to specific data. Ex. Grant backup administrators access to all servers on the network.
This aspect of cybersecurity is being compromised when someone is shoulder surfing and snooping on you.
What is confidentiality?
What is the strongest wireless encryption standard commonly utilized to protect WiFi networks?
What is WPA2?
This is the chemical symbol for gold.
What is Au?
Identifies a set of rules or standards that define personal behaviors.
What is a code of ethics?
This is when n attacker intercepts communications between two network hosts by impersonating each host.
What is a Man-in-the-Middle attack?
Software that records information about a PC and its user. It is used to describe software that the user has acknowledged can record information about their habits.
What is Adware?
This authentication type include things like PINs, Passwords, or Pattern locks. This is sometimes referred to as SOMETHING YOU KNOW.
What is Type 1 Authentication?
This is a way of proving you are who you say you are.
What is Authentication?
This is a name of any early encryption that was developed by a leader to send messages during war.
What is Caesar Cipher?
This is the term for a group of flamingos.
What is a Flamboyance?
This is the name of Microsoft's anti-malware product.
What is Windows Defender?
This is the best countermeasure against social engineering.
What is Training? User Training?
Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.
What is Virus?
This is feature of type 3 authentication it is the recognition of individuals based on their biological characteristics.
What is Biometrics?
This is a means of keeping track of who does what on a computer or network.
What is Accounting?
The process of encoding or translating data into another form so that only the intended recipient can decrypt and read the data.
What is Encryption?
This app has a green owl as the mascot?
What is Duolingo?
This sets expectations for user privacy when using company resources.
What is acceptable use policy?
A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks
What is Zombie/botnet?
Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment.
What is Ransomware?
This authentication type include things such as key fobs, hardware tokens, one-time passcode, and usb keys. This is sometimes referred to as SOMETHING YOU HAVE.
What is Type 2 Authentication?
This aspect of cybersecurity is being compromised when the cleaning crew accidentally disconnects the ethernet cable leading to a crucial database.
What is a Availability?
A form of encryption that uses only one key to encrypt and decrypt a file. This is a less secure form of encryption.
What is Symmetric Encryption?
According to the 1993 live-action movie, Super Mario Bros. this is the last name of the Mario and Luigi.
What is Mario?
Which Internet protocol is used to transmit encrypted data?
What is HTTPS?
An email-based social engineering attack in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
What is phishing?
A type of malware that replicates between processes in system memory and can spread over client/server network connections.
What is a Worm?
Requiring two or more types of authentication is referred to as this.
What is Multifactor Authentication?
In cybersecurity, this term is used to describe the process of specifying which actions a user can perform.
What is Authorization?
A way for two computers to verify their identity before they exchange information.
What is a security certificate?
This is the first Disney princess to have a tattoo.
Who is Pocahontas?
This is a device that controls the flow of network traffic to protect systems from unauthorized network connections.
What is a Firewall?
An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
What is a Denial of Service? DOS/DDOS
This is malicious software or hardware that can record user keystrokes.
What is a keylogger?
This authentication type include things such as your fingerprints, handprints, retinal patterns, face, or voice. This is sometimes referred to as SOMETHING YOU ARE.
What is Type 3 Authentication?
This aspect of cybersecurity is concerned with making sure data is not manipulated and changed while in transit or at rest.
What is a integrity?
A form of encryption in which both parties involved have a public key and a private key. By using complex mathematical formulas, the computer generates the keys in a way that any file encrypted with the public key can only be decrypted by the private key.
What is Asymmetric Encryption?
This is the official name for the “prove you’re not a robot” tests that websites sometimes require.
What are CAPTCHAs?
This term is a key component of fault tolerance. It is the practice of duplicating components of a system to help tolerate failures.
What is Redundancy?
A social engineering tactic where a team communicates, whether directly or indirectly, a lie or half-truth in order to get someone to believe a falsehood
What is Pretexting?
This is a malicious software program hidden within an innocuous-seeming piece of software. Usually, it is used to try to compromise the security of the target computer.
What is a Trojan?
This is a method that allows you to log into one system and have access to other related systems.
What is Single sign-on?
We use this term to describe the inability to refute responsibility
What is Non-Repudiation?
This is the term we use for data that is in a persistent storage medium, such as a hard drive or optical disc.
What is Data at Rest?
This is the longest running animated American TV show.
What is The Simpsons?