1
2
3
4
5
100

what type of malware encrypts files and demands payment to unlock them?

Ransomware

100

Keyloggers are designed to:

record keystrokes to steal passwords.

100

spear phishing is:

targeted phishing at specific people

100

watering hole attacks:

infect commonly visited websites to target users

100

blue and red make: 

purple

200

Which malware pretends to be legitimate software but secretly harms your system?

Trojan 

200

Adware is a type of malware that:

Displays unwanted ads. 

200

whaling attacks target:

executives or high-value targets 

200

Rogue software installed by a user unknowingly is often called:

Trojan 

200

name the colors in the rainbow in order 

red, orange, yellow, green, blue, indigo, violet 

300

malware that spreads across networks automatically without user action is called a:

worm

300

Rootkits are dangerous because they: 

Hide malware deep in the system. 

300

Vishing refers to:

phishing via phone

300

Logic bombs are: 

malware triggered by a specific event or date

300

the more you take away the bigger I get. what am I? 

a hole

400

Malware that attaches to files and requires the user to open them is called a: 

virus

400

what is zero-day exploit:

exploit targeting a flaw before a patch is available. 

400

Pharming attacks

redirect users to fake websites without their knowledge

400

Botnets are:

Networks of infected devices controlled remotely 

400

if a rooster laid an egg on a triangular roof which way would it roll left or right?

Roosters don't lay eggs....

500

Spyware is used to:

monitor and steal user information. 

500

phishing is an example of:

Social Engineering 

500

tailgating is a physical security threat where: 

someone follows an authorized person into a building 

500

Social engineering attacks primarily exploit:

Human trust and behavior 

500

what came first the egg or the chicken

the egg (duh)

M
e
n
u