Cyber Terms
Threat Types
Ethics and Responsibility
Defense and Passwords
Social Engineering
100

What does the “C” in CIA triad stand for?

Confidentiality

100

What type of malware encrypts files and demands payment?

Ransomware

100

What is the ethical response to witnessing cyberbullying?

Report it to a trusted adult or platform

100

What does MFA stand for?

Multi-Factor Authentication

100

What tactic involves sending fake emails to trick users?

Phishing

200

What is the practice of protecting digital systems from threats?

Cybersecurity

200

What malware spreads without user action?

Worm

200

What is the term for asking permission before sharing someone’s content?

Consent

200

What makes a password strong?

Length, complexity, unpredictability (Upper Lower Number Special Length)

200

What tactic involves pretending to be someone trustworthy?

Pretexting

300

What does the “A” in CIA triad stand for?

Availability

300

What malware disguises itself as legitimate software?

Trojan Horse

300

What is the long-term record of your online actions called?

Digital Footprint

300

What tool stores and manages secure passwords?

Password Manager

300

What tactic involves leaving a tempting item like a USB in public?

Baiting

400

What is a weakness that can be exploited by a threat?

Vulnerability

400

What attack floods a server with traffic to make it crash?

Denial-of-Service (DoS)

400

What behavior involves repeatedly harming someone online?

Cyberbullying

400

What type of authentication uses a fingerprint?

Biometric

400

What tactic involves following someone into a secure area?

Tailgating

500

What is the term for the likelihood of harm from a threat exploiting a vulnerability?

Risk

500

What malware secretly records keystrokes?

Spyware

500

What is the responsible action after posting something harmful?

Remove it, apologize, and report if needed

500

What attack tries every possible password combination?

Brute Force Attack

500

What tactic involves impersonating IT support to get a password?

Social Engineering/Impersonation

M
e
n
u