Stored digital data is said to be “at” what if it’s inactive? (Hint: As opposed to being “in motion” when moving in a network)
Rest
What does the first "D" stand for in the common cybercrime known as a DDoS attack?
Distributed (Distributed Denial-of-Service)
What does the 'P' stand for in 'HTTP'?
Protocol
This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability.
White Hat
What term is given to a software application that automatically downloads or displays marketing banners or pop-ups when a user is online?
Adware
Which term related to designing houses can also describe the underlying cybersecurity structure, as well as the technology and policies that support it?
Architecture
Put into effect in 2018, the European Union's GDPR is considered one of the world's toughest privacy laws. GDPR stands for "General Data WHAT Regulation." What word is missing?
Protection
What “J” cybersecurity company based out of Denver, CO offers an automated server management tool? Its name is a compound word, which kind of sounds like it’s commanding a cumulonimbus to leap.
Jumpcloud
A website with a site certificate is one that uses encryption; this letter after http is one sign of it.
S
What is the two word term for the type of cybersecurity breach in which a user is convinced to disclose secrets due to an exploitation of trust and reliance on cognitive biases? In short, this is a type of attack focused on human gatekeepers of information rather than the computer system itself.
Social Engineering
It sounds like something a hacking hound would do, but which term describes watching for and catching data packets passing through a network’s traffic?
Sniffing
Turn to the side and tell me: what P-term is any form of automated processing of personal data that consists of the use of personal data to evaluate certain personal aspects relating to a natural person?
Profiling
“CoaLMine105" is easy to pull up with a new password manager Microsoft Edge released in a preview channel named for what frequently yellow type of bird?
Canary
Companies consider cybersecurity when instructing employees with a policy on BYOD, short for this.
Bring Your Own Device
No flexibility on your answers: launched in 2006, Amazon's EC2 stands for WHAT Compute Cloud?
Elastic
What type of security—OPSEC for short—helps make sure that the sensitive info in your system does not end up in ill-intentioned hands? (Hint: It’s also called procedural security)
Operational
On June 7, 2021, the Department of Justice announced that it had seized approximately $2.3 million worth of what cryptocurrency from the Darkside Colonial Pipeline hackers?
Bitcoin
What “M” computer security company, founded by namesake John in 1987 before being acquired by Intel in 2011, is well known for its anti-virus software that is available to individual consumers?
McAfee
A ransomware attack that encrypted 3,800 city of Atlanta computers demanded 6 of these digital items to unfreeze them.
Which term borrowed from a wet weather event refers to a cyber attack that sends more traffic into a system than it can handle? (Hint: It’s a more layperson-friendly term for a Denial of Service attack)
Flooding
What term is used for the most basic level or core of an operating system, responsible for resource allocation, file management and security? In a different context, this word can also mean the seed and hard husk of a cereal.
Kernel
Massimiliano Montoro developed a password cracking tool for Windows that was named after what biblical pair of brothers with a notable, fatal head-cracking in their story?
Cain and Abel
In 2015, over 25 gigabytes of user data were famously leaked by a group self-named "The Impact Team", exposing people seeking extramarital affairs on which two-word Canadian dating network? Both words are common girls' names.
Ashley Madison
Beware of these types of programs that track every stroke you make while typing in an effort to glean your password.
Keylogging
According to a former Facebook employee, the company used to have a master password that could unlock any user's account. This password was a variation on the name of what martial artist and actor, perhaps because he definitely couldn't be considered "too weak"?
Chuck Norris