Cybersecurity
Food
Sports
Geography
More cybersecurity
100

If using a windows-based PC, you do this to quickly lock your computer before stepping away

Windows key and the letter L

100

Restaurant slogan is "eat fresh" 

Subway 

100

Who has the most tennis wimbledon titles?

Roger Federer 
100

What is earth's largest ocean by surface size?

Pacific

100

A hacker that tries to break into a system to identify the weakness

White hat/ethical hacker

200

Name the country that has the most reported computer infections from virus attacks.

China

200

Hershey was founded in which US state?

Pennsylvania 

200

Who founded the game of basketball?

James Naismith 

200

What is the smallest state in the US?

Rhode Island 

200

What does CIA (for cybersecurity) stand for?

Confidentiality, integrity and availability 

300

Any combination of your name, your home address or phone number, credit card or account numbers or social security number.

PII (personally identifiable information) 

300

Which South American country is the world's largest producer of coffee?

Brazil 

300

How long is a football end zone?

10 yards 

300

What is the longest river in the world?

Nile

300

The list of computers, laptops, software, and equipment by an organization is called?

Inventory

400

Majid uses several fake e-mails and social engineering to trick Marcelo into giving him his personal information. This is an example of?

Spear phishing 

400

What type of pasta is commonly known as bow-tie pasta?

Farfalle 

400

Which NFL team is publicly owned?

Green Bay Packers 

400

Which country has the most volcanoes?

Indonesia 

400

Watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device.

Shoulder surfing 

500

Beware of these types of programs that track every stroke you make while typing in an effort to glean your password

Keylogging

500

Which vegetable has the highest water content of any other vegetables?

Cucumber

500

In what year were the first Air Jordan sneakers released?

1984 

500

How many US states border the Gulf of Mexico?

5 - Florida, Alabama, Mississippi, Louisiana and Texas 

500

They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.

State sponsored hacking 

M
e
n
u