Cybersecurity
Computer Science
Acronyms
Networking
Misc.
100

You receive an email from the bank telling you that there is an issue with your account and to email them back with your information. What should you do?

Delete the email and report it. It is most likely a scam email. If you need to update your information, go to the website yourself and change the password or update it there. Do not click any links or download any attachments.

100
What is a bit and what does it stand for?

Bit stands for Binary Digit and is the most basic unit of information in computing and digital communications.

100

What does PII stand for and what are examples of it?

Birthdate, Name, Address, Etc.

100

Who tries to break into networks?

Hackers

100
What is harmful software that seeks to damage or exploit the computer that runs it or installs it?

Malware

200

When you log into a site, you must input a password and confirm your identity with another device. What is it called?

Two-Factor Authentication/Multi-Factor Authentication

200

What are the three most popular Operating Systems?

Windows, Linux, and macOS.

200

What does HTML stand for?

Hyper Text Markup Language. It's the language websites are written in.

200

What is the internet?

The worldwide network that connects the world's computers.

200

What is the language that computers read to carry out instructions?

Binary

300

Why are Cyber Vulnerabilities unlikely to ever go away?

A. The government won't allow people to fix them

B. Criminals need them to steal identities

C. They are side effects of the freedom and ease of communicating online

D. They're protected in a secret base on the moon

C

300

Name four different programming languages.

Python, Java, JavaScript, SQL, C++, C, R, etc. (Not HTML or CSS)

300

What does CVE stand for?

Common Vulnerabilities and Exposure: a list of publicly disclosed computer security flaws.

300

What is Wifi?

Technology that allows your computer to connect to the internet without a cord.
300

What locks your computer, holds it hostage, and threatens to damage or delete files unless you give up something?

Ransomware
400

What is "the art of keeping information secure by transforming it?"

Cryptography

400

What are the main components of a computer system?

  • CPU (Central Processing Unit) including control unit and arithmetic logic unit
  • Memory like the hard drive and RAM
  • Input and output devices like keyboard mouse, printer scanner, etc.
400

What is CIA? 

Confidentiality, Integrity, and Availability

400

What is the difference between a router, a switch, and a hub?

Router: Connects Networks

Switch: Connect devices inside a network

Hub: Connect devices inside a network and broadcast each message out

400

What does Defense in Depth mean?

It means there are many layers of security within one another.

500
What are the differences between vishing, smishing, and phishing?

Vishing: Voice - Phone, robocall, voicemail, voice over internet protocol (VoIP) 

Smishing: SMS - Text message 

Phishing: Email

500

What was the very first type of computer?

A Calculator

500

What does SSH stand for

Secure Socket Shell or Secure SHell

500

What are LANs, WANs, MANs, SANs, PANs, VLANs, and WLANs?

Local Area Network, Wide Area Network, Storage Area Network, Personal Area Network, Virtual Local Area Network, and Wireless Local Area Network

500

What is the difference between authentication and authorization?

Authentication: the act of validating that users are whom they claim to be. 

Authorization: the process of giving the user permission to access a specific resource or function