Cybersecurity Basics
Social Engineering
Good Habits at Work
Cyber Threats & Attacks
Practice
100

This type of security is about protecting systems, networks, and programs from digital attacks

What is cybersecurity?

100

This is a social engineering scam where someone sends fraudulent communications pretending to come from a reputable source, usually over email or text.

What is phishing?

100

You should do this to keep your software safe and current.

What is update it?

100

This is the act of attempting to gain access by making as many login attempts as possible as quickly as possible

What is a brute-force attack

100

This state is known as the Sunshine State.

What is Florida?

200

This is the practice of using a secret combination of letters, numbers, and symbols to protect access to your accounts.

What is a password  

200

This type of phishing is when someone asks for sensitive info over chat or text.

What is smishing?

200

You should do this when you leave your desk.

What is lock your computer?

200

This is a type of malware that records everything you do

What is spyware/keylogger?

200

The chemical symbol for water.

What is H₂O?

300

This unique string of numbers identifies a device on a network and can be used to track online activity or restrict access.

What is an IP address?

300

This is when someone follows you into a secure building.

What is tailgating/piggybacking?

300

This is a safe way to connect to work from home.

What is a VPN?(forticlient)

300

This is when hackers steal your data and ask for money.

What is ransomware?

300

This planet is known as the Red Planet.

What is Mars?

400

This process scrambles your data so others can’t read it.

What is encryption?  

400

This is the best way to verify a suspicious request from a coworker or manager.

What is contacting them through a trusted channel?

400

EPES requires this every 90 days to keep our network safe and secure.

What is update your password?

400

This type of threat comes from someone who has authorized access, such as a disgruntled employee or malicious contractor


What is an insider threat?


400

The pyramids are located in this country.

What is Egypt?