S
H
E
I
N
100

Stored digital data is said to be “at” what if it’s inactive? (Hint: As opposed to being “in motion” when moving in a network)

Rest

100

What does the first "D" stand for in the common cybercrime known as a DDoS attack?

Distributed (Distributed Denial-of-Service)

100

What does the 'P' stand for in 'HTTP'?

Protocol

100

This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability.

White Hat

100

What term is given to a software application that automatically downloads or displays marketing banners or pop-ups when a user is online?

Adware

200

Which term related to designing houses can also describe the underlying cybersecurity structure, as well as the technology and policies that support it?

Architecture

200

Put into effect in 2018, the European Union's GDPR is considered one of the world's toughest privacy laws. GDPR stands for "General Data WHAT Regulation." What word is missing?

Protection

200

What “J” cybersecurity company based out of Denver, CO offers an automated server management tool? Its name is a compound word, which kind of sounds like it’s commanding a cumulonimbus to leap.

Jumpcloud

200

A website with a site certificate is one that uses encryption; this letter after http is one sign of it.

S

200

What is the two word term for the type of cybersecurity breach in which a user is convinced to disclose secrets due to an exploitation of trust and reliance on cognitive biases? In short, this is a type of attack focused on human gatekeepers of information rather than the computer system itself.

Social Engineering

300

It sounds like something a hacking hound would do, but which term describes watching for and catching data packets passing through a network’s traffic?

Sniffing

300

Turn to the side and tell me: what P-term is any form of automated processing of personal data that consists of the use of personal data to evaluate certain personal aspects relating to a natural person?

Profiling

300

“CoaLMine105" is easy to pull up with a new password manager Microsoft Edge released in a preview channel named for what frequently yellow type of bird?

Canary

300

Companies consider cybersecurity when instructing employees with a policy on BYOD, short for this.

Bring Your Own Device

300

No flexibility on your answers: launched in 2006, Amazon's EC2 stands for WHAT Compute Cloud?

Elastic

400

What type of security—OPSEC for short—helps make sure that the sensitive info in your system does not end up in ill-intentioned hands? (Hint: It’s also called procedural security)

Operational

400

On June 7, 2021, the Department of Justice announced that it had seized approximately $2.3 million worth of what cryptocurrency from the Darkside Colonial Pipeline hackers?

Bitcoin

400

What “M” computer security company, founded by namesake John in 1987 before being acquired by Intel in 2011, is well known for its anti-virus software that is available to individual consumers?

McAfee

400

A ransomware attack that encrypted 3,800 city of Atlanta computers demanded 6 of these digital items to unfreeze them.

Bitcoins
400

Which term borrowed from a wet weather event refers to a cyber attack that sends more traffic into a system than it can handle? (Hint: It’s a more layperson-friendly term for a Denial of Service attack)

Flooding

500

What term is used for the most basic level or core of an operating system, responsible for resource allocation, file management and security? In a different context, this word can also mean the seed and hard husk of a cereal.

Kernel

500

Massimiliano Montoro developed a password cracking tool for Windows that was named after what biblical pair of brothers with a notable, fatal head-cracking in their story?

Cain and Abel

500

In 2015, over 25 gigabytes of user data were famously leaked by a group self-named "The Impact Team", exposing people seeking extramarital affairs on which two-word Canadian dating network? Both words are common girls' names.

Ashley Madison

500

Beware of these types of programs that track every stroke you make while typing in an effort to glean your password.

Keylogging

500

According to a former Facebook employee, the company used to have a master password that could unlock any user's account. This password was a variation on the name of what martial artist and actor, perhaps because he definitely couldn't be considered "too weak"?

Chuck Norris

M
e
n
u