One of the most common types of social engineering attacks
Phishing
The external input tool named after an animal
Mouse
Text or graphic that connects to another page or site
Hyperlink
Name one type of Cyber Attack
(possible answers) Ransomware, DoS, DDOS, Phishing, Whaling, Smishing, Spear phishing, Spoofing, Social Engineering, Tailgating, Code Injection, Logic Bomb, DNS Tunneling
Artist-first music platform powered by a global community of artists and listeners to help them build and grow their careers
SoundCloud
Two examples of "Red Flags" in a Phishing Email
(possible answers): unfamiliar greeting, grammar/spelling mistakes, email addresses and domain names that don't match, unusual content or request
Where the temporary memory is stored
RAM
The address of a webpage
URL
MFA is an acronym for this term
Multi-Factor Authentication
A tool used for the download and distribution of pirated materials; particularly pirated music.
(Also named after a fruit)
Limewire
Manipulating people into performing actions or divulging confidential information
Social Engineering
Where the permanent memory is stored
Hard drive
"WI-FI" is short for this
Wireless Fidelity
This protocol authenticates websites and confirms its trustworthiness
HTTPS (Hypertext Transfer Protocol Secure)
This social media platform was originally created to connect with other college students
The percentage of breaches that involve compromised passwords
80%
Part of the computer considered to be its brain
CPU
WWW stands for this
World Wide Web
This attack involves sneaking into a prohibited place behind a person who is authorized to enter.
Tailgating
What online social network service is used for photograph and video sharing. Launched in 2010
One way to prevent bad actors from breaking into your accounts
(possible answers) MFA, Spotting Red Flags, Identifying Phishing Emails, Never Clicking Links in Emails or Messages Unless You Are Sure of the Source and Legitimacy
The primary circuit board that holds all the hardware in place
Motherboard
A uniquely assigned numeric address for each computer connected to the internet
IP Address
Three forms of biometrics used for identity and access management
(possible answers) Fingerprints, Facial Recognition, Retinal Scan, Iris Scan, Voice Recognition
One of the first websites to allow users to create web "profile" pages that feature photographs, music, and expresses their interests
Myspace