Cyber Basics
Threats & Attacks
Cyber History: Back in My Day...
Cyber Tools and Defense
Law & Order: Cyber Unit
100

What is the most common password used?

What is "123456" or "password"?

100

What is the name of a fake website that mimics a real one to steal your info?

What is a spoofing or phishing website?

100

Which operating system was infamously vulnerable to viruses in early 2000s, giving a rise to a golden age of malware?

What is Windows(XP)?

100

What team is used to stimulate real-word attacks on your systems to treat your defenses?

What is red team?

100

What framework uses the categories to Identify, Protect, Detect, and Respond?

What is NIST Cybersecurity Framework?

200

What does HTTPS stand for?

What is Hypertext Transfer Protocol?

200

Which malware pretends to be a legitimate program but secretly does something harmful?

What is Trojan Horse?

200

What is the first major worm to use social engineering by pretending to be a love letter?

What is ILOVEYOU Virus (2009)

200

What is anti-spyware?

What is software designed to specifically to detect and remove spyware?

200

What regulation is aimed to protect children's online privacy in the U.S.?

What is Children's Online Privacy Protection Act (COPPA)?

300

How to protect data in transit?

What is HTTPS/TLS?

300
What's the name of the ransomware tactic where attackers threaten to leak data unless payment is made?

What is Double Extortion?

300

What 1995 film starring Angelina Jolie popularized the image of edgy teen hackers in pop culture?

What is Hackers?

300

What method of encryption uses the same key for both encryption and decryption?

What is symmetric encryption?

300

What global privacy law introduced the "right to be forgotten"?

What is General Data Protection Regulation (GDPR)?

400

How to protect data in rest?

What is encrypt data at rest with strong key management practices?

400

What kind of attack tricks a user into clicking a link that executes malicious code in their browser?

What is Cross-Site Scripting (XSS)?

400

What popular retailer's 2013 breach was caused by compromised HVAC vendor credentials?

What is Target?

400

What tool can sniff network packets and is often used in ethical hacking and network diagnostics?

What is Wireshark?

400

Which ISO standard focuses on information security management systems?

What is ISO/IEC 27001?

500

What is SSRF?

What is server-side request forgery?

500

What attack method monitors a target's public communications to craft convincing phishing messages?

What is Open-Source Intelligence (OSINT) based social engineering?

500

What was the first known computer worm to spread across the internet in 1988?

What is The Morris Worm?

500

What's the term for disguising data in transit to look like something else to avoid detection?

What is Tunneling?

500

What U.S. regulation requires financial institutions to develop and maintain a written information security plan?

What is Gramm-Leach Bliley Act (GBLA)?

M
e
n
u