What is the weakest link in cybersecurity?
People inside the organization
What is the most common type of cyberattack that targets employees?
[A] Phone Call [B] Snail Mail [C] Phishing [D] Dog
[C] Phishing
Protecting data by transforming it into a secure format that can only be read with a key is called what?
Encryption
On an average, how long does it takes for an unprotected computer to be compromised once it is connected to the Internet:
[A] 20 minutes [B] 1 week [C] 10 hours [D] 12 months
[A] 20 minutes?
When attackers send fraudulent emails to trick recipients into revealing sensitive information or clicking on malicious links it is called?
[A] Email [B] Sniffing [C] Key Logging [D] Phishing [E] Paper Jam[D] Phishing
What is patch management?
Applying updates to software to fix vulnerabilities.
Which of the following devices could potentially be exploited by an attacker? (select all that apply)
A) Desktop computer
B) Laptop computer
C) Cell phone
D) Television
E) Toaster
Answer: All of them. Yes, even the toaster if it has WiFi
Malicious programs that extort money from their victims by blocking access to the computer or encrypting the data stored on it until the victim pays.
[A] Virus [B] Ransomware [C] Phishing [D] D DOS [E] ATM
[B] Ransomware
Name a type of testing measure used to assess cyber vulnerabilities.
Penetration testing
What acronym is used to describe everyday objects that are connected to the internet and are able to collect and transfer data automatically?
[A] UPS [B] ISP [C] IoT [D] VPN [E] BAD
[C] IoT (Internet of Things)
Which of these terms is NOT a type of cyber phishing
[A] Smishing [B] Wishing [C] Quishing [D] Vishing
[B] Wishing
This authentication method is the best way to restrict access to your files and devices?
Multi-Factor/Two-Factor
What is the average cost of a data breach in the U.S. Public Sector organizations?
[A] $100 Thousand [B] $480 Thousand [C] $2.3 Million [D] $20 and a Costco membership [E] $15 Million
[A] $2.3 million
with an average cost of $75 per record.
Social ______ is the name of the cybersecurity threat where actors gather information about a person from online sources to trick others into revealing sensitive information.
Engineering
What is a honeypot in cyber security?
A decoy file/server used to attract attackers and alert IT staff of a threat.