Security
Business
Portmanteau
Pop Culture
Recovery
100

This method of verification uses something you know and something you have. 

What is multi-factor authentication?

100

This term describes the process of moving company data to online servers.

What is Cloud Migration?

100

"Internet" and "etiquette" describes good behavior on the web.

What is Netiquette?

100

This movie's plot revolves around a computer virus named "WOPR" that nearly starts World War III.

What is "WarGames"?

100

This is the practice of making copies of data so that these additional copies may be used to restore the original after a data loss event.

What is Data Backup?

200

This type of attack involves tricking you into revealing your personal information.

What is Phishing?

200

BYOD stands for a policy allowing employees to use their personal devices for work.

What is Bring Your Own Device?

200

Describing something to someone who as though they know nothing about computers.

What is Techsplaining?

200

This animated series features a tech-savvy dog named Brain and his owner, who often find themselves in technological misadventures.

What is "Inspector Gadget"?

200

This strategy involves having duplicate systems in different physical locations.

What is Redundancy?

300

This is a cyberattack where hackers demand payment to restore access to data.

What is Ransomware?

300

This business model allows software to be used on a subscription basis.

What is Software as a Service (SaaS)?

Or Cloud Computing?

300

"Spying" and "software," describing software that secretly monitors your computer activities.

What is Spyware?

300

This film features a character named Thomas Anderson, who learns about the real world after being recruited by hackers.

What is "The Matrix"?

300

This term describes a plan to keep business operations running during a disaster.

What is Business Continuity Planning?

400

This practice keeps your software up-to-date to protect against known vulnerabilities.

What is patching?

400

This acronym stands for an approach where IT services are handled by a third party.

What is Managed Service Provider (MSP)?

400

"Voice" and "over" and "internet" and "protocol" describes making phone calls via the internet.

What is VoIP?

400

In this movie, a group of hackers aim to steal money from a bank's computer system, led by a character named Cosmo.

What is "Sneakers"?

400

This tech ensures your company's data is safe even if one server goes down; it's all about redundancy.

What is Failover?

500

This security measure checks if you are human by asking you to click on images or solve puzzles.

What is CAPTCHA? 

(Completely Automated Public Turing test to tell Computers and Humans Apart)

500

This term refers to the process of combining different systems and software to work together seamlessly.

What is integration?

500

A portmanteau description of portmanteau itself.

What is "Frankenword"?

500

This sci-fi series explores the consequences of artificial intelligence, with episodes centered around technology and privacy.

What is "Black Mirror"?

500

In disaster recovery, this is a fully operational off-site data processing facility that can take over immediately if the primary site fails.

What is a Hot Site?

M
e
n
u