What is the most common password used?
What is "123456" or "password"?
What is the name of a fake website that mimics a real one to steal your info?
What is a spoofing or phishing website?
Which operating system was infamously vulnerable to viruses in early 2000s, giving a rise to a golden age of malware?
What is Windows(XP)?
What team is used to stimulate real-word attacks on your systems to treat your defenses?
What is red team?
What framework uses the categories to Identify, Protect, Detect, and Respond?
What is NIST Cybersecurity Framework?
What does HTTPS stand for?
What is Hypertext Transfer Protocol?
Which malware pretends to be a legitimate program but secretly does something harmful?
What is Trojan Horse?
What is the first major worm to use social engineering by pretending to be a love letter?
What is ILOVEYOU Virus (2009)
What is anti-spyware?
What is software designed to specifically to detect and remove spyware?
What regulation is aimed to protect children's online privacy in the U.S.?
What is Children's Online Privacy Protection Act (COPPA)?
How to protect data in transit?
What is HTTPS/TLS?
What is Double Extortion?
What 1995 film starring Angelina Jolie popularized the image of edgy teen hackers in pop culture?
What is Hackers?
What method of encryption uses the same key for both encryption and decryption?
What is symmetric encryption?
What global privacy law introduced the "right to be forgotten"?
What is General Data Protection Regulation (GDPR)?
How to protect data in rest?
What is encrypt data at rest with strong key management practices?
What kind of attack tricks a user into clicking a link that executes malicious code in their browser?
What is Cross-Site Scripting (XSS)?
What popular retailer's 2013 breach was caused by compromised HVAC vendor credentials?
What is Target?
What tool can sniff network packets and is often used in ethical hacking and network diagnostics?
What is Wireshark?
Which ISO standard focuses on information security management systems?
What is ISO/IEC 27001?
What is SSRF?
What is server-side request forgery?
What attack method monitors a target's public communications to craft convincing phishing messages?
What is Open-Source Intelligence (OSINT) based social engineering?
What was the first known computer worm to spread across the internet in 1988?
What is The Morris Worm?
What's the term for disguising data in transit to look like something else to avoid detection?
What is Tunneling?
What U.S. regulation requires financial institutions to develop and maintain a written information security plan?
What is Gramm-Leach Bliley Act (GBLA)?