Cyber Basics
Threats & Attacks
Cyber History: Back in My Day...
Cyber Tools and Defense
Law & Order: Cyber Unit
100

What is the most common password used?

What is "123456" or "password"?

100

What is the name of a fake website that mimics a real one to steal your info?

What is a spoofing or phishing website?
100

Which operating system was infamously vulnerable to viruses in early 2000s, giving a rise to a golden age of malware?

What is WindowsXP?

100

What team is used to stimulate real-word attacks on your systems to treat your defenses?

What is red team?

100

What framework uses the categories to Identify, Protect, Detect, and Respond?

What is NIST Cybersecurity Framework?

200

What does HTTPS stand for?

What is Hypertext Transfer Protocol?

200

What is called when attackers use AI generated content or fake videos to impersonate someone?

What is Deepfake?

200

What is the first major worm to use social engineering by pretending to be a love letter?

ILOVEYOU Virus (2009)

200

What's the name of the software designed to specifically to detect and remove spyware?

What is anti-spyware?

200

What regulation is aimed to protect children's online privacy in the U.S.?

What is Children's Online Privacy Protection Act (COPPA)?

300

What is the minimum recommended number of characters for a strong password?

What is at least 12 characters?

300

What cyberattack involves inserting malicious code into a SQL query?

What is SQL injection?

300

What 1995 film starring Angelina Jolie popularized the image of edgy teen hackers in pop culture?

What is Hackers?

300

What browser extension blocks ads and malicious scripts to protect your browsing experience?

What is AdBlock or uBlock origin?

300

Which ISO standard focuses on information security management systems?

What is ISO/IEC 27001?

400

What is CAPTCHA meant to stop?

What is Automated Bots from accessing site or service?

400

What kind of malware gives an attacker complete control of a victim's system?

What is Remote Access Trojan (RAT)?

400

What popular retailer's 2013 breach was caused by compromised HVAC vendor credentials?

What is Target?

400

What tool can sniff network packets and is often used in ethical hacking and network diagnostics?

What is Wireshark?

400

What global privacy law introduced the "right to be forgotten"?

What is General Data Protection Regulation (GDPR)?

500

What are the three main types of multi-factor authentication factors?

What is something you know (password), something you have (token), something you are (biometrics)?

500

What attack method monitors a target's public communications to craft convincing phishing messages?

What is Open-Source Intelligence (OSINT) based social engineering?

500

What major data leak in 2016 exposed users of a site for people seeking extramarital affairs?

What is Ashley Madison Breach?

500

What's the term for disguising data in transit to look like something else to avoid detection?

What is Tunneling?

500

What U.S. regulation requires financial institutions to develop and maintain a written information security plan? 

What is Gramm-Leach Bliley Act (GBLA)?

M
e
n
u