GENERAL CYBERSECURITY
PHISHING
AI AND DEEPFAKES
PASSWORDS
PHYSICAL SECURITY
200

What does the “S” stand for in HTTPS?

A) Secure

B) Server

C) Session

D) Script

A) Secure

200

Q: What kind of attack tricks you into giving up personal info?

A. Phishing
B. Spoofing
C. Sniffing
D. Spamming

A. Phishing

200

Q: What does AI stand for?


A. Automated Interface
B. Artificial Intelligence
C. Advanced Internet
D. Auto Input

B. Artificial Intelligence

200

Q: What kind of password is best?


A. Your birthday
B. Short and simple
C. Long and complex
D. Your pet’s name

C. Long and complex

200

Q: Should you let someone follow you into a secure area?
A. Yes, if they smile
B. Only if they look official
C. No
D. Always

C. No

400

What does the “S” in HTTPS stand for?

A. A type of firewall
B. A secure software
C. Software designed to harm systems
D. A password manager

C. Software designed to harm systems

400

Q: What’s a common sign of a phishing email?

A. Personalized greeting
B. No links
C. Urgent tone and suspicious links
D. Sent from your boss

C. Urgent tone and suspicious links

400

Q: What is a deepfake video?


A. A secure video
B. A fake video made with AI
C. A type of malware
D. A phishing email

B. A fake video made with AI

400

Q: What helps you manage strong passwords?
A. Sticky notes
B. Password manager
C. Email
D. Antivirus

B. Password manager

400

Q: What should you do with a found USB drive?


A. Plug it in
B. Give it to a coworker
C. Report it to IT
D. Use it for backups

C. Report it to IT

600

What principle limits access to only what is needed?

A. Full Access
B. Least Privilege
C. Zero Trust
D. Open Policy

B. Least Privilege 

600

What is spear phishing?

A. Random spam
B. Targeted phishing attack
C. Phishing via phone
D. Malware disguised as email

B. Targeted phishing attack

600

Q: Why are deepfakes a cybersecurity concern?


A. They’re fun to watch
B. They can impersonate people
C. They slow down the internet
D. They’re easy to detect

B. They can impersonate people

600

Q: What is multi-factor authentication (MFA)?


A. Using one password
B. Using a backup email
C. Using multiple ways to verify identity
D. Changing passwords monthly

C. Using multiple ways to verify identity

600

Q: What’s it called when you lock your screen before leaving?


A. Screen timeout
B. Screen locking
C. Auto logout
D. Power saving

B. Screen locking

800

What’s the difference between a vulnerability and a threat?

A. They’re the same
B. A threat is a weakness; a vulnerability is an attack
C. A vulnerability is a weakness; a threat exploits it
D. A threat is always internal

C. A vulnerability is a weakness; a threat exploits it

800

Q: What’s the difference between phishing and smishing?

A. Phishing is fake websites; smishing is fake apps
B. Phishing uses email; smishing uses text
C. Smishing is more dangerous
D. Phishing is legal

B. Phishing uses email; smishing uses text

800

Q: How can you spot a deepfake?


A. Perfect lighting
B. Unnatural blinking or mismatched audio
C. High resolution
D. Fast loading

B. Unnatural blinking or mismatched audio

800

Q: What is a passphrase?


A. A short password
B. A phrase that’s easy to guess
C. A long, memorable phrase
D. A code sent to your phone

C. A long, memorable phrase

800

Q: What is a clean desk policy?


A. Keeping your desk tidy

B. No food at your desk

C. Securing sensitive info when not in use 

D. Using only digital notes

C. Securing sensitive info when not in use 

1000

Q: What framework includes Identify, Protect, Detect, Respond, and Recover?

A. ISO 27001
B. NIST Cybersecurity Framework
C. OWASP Top 10
D. MITRE ATT&CK

B. NIST Cybersecurity Framework

1000

Q: What is a “watering hole” attack?

A. A fake login page
B. A phishing site
C. Compromising a trusted website
D. A fake social media profile

C. Compromising a trusted website ✅C) 1969

1000

Q: What’s it called when AI mimics writing style for phishing?


A. Smart phishing
B. AI spoofing
C. Adversarial AI
D. Neural hacking

C. Adversarial AI

1000

Q: What is credential stuffing?


A. Guessing passwords
B. Using stolen credentials on multiple sites
C. Filling out forms
D. Encrypting passwords

B. Using stolen credentials on multiple sites

1000

Q: What is “juice jacking”?


A. Charging your phone too fast
B. Using public Wi-Fi
C. Malware via public charging ports
D. Overheating your device

C. Malware via public charging ports

M
e
n
u