Ethics, Laws, & Misc.
Information Assurance
Vulnerabilities & Risks
Computer Components
Cyber Attacks
100
True or false: Everything that's illegal is also unethical.

What is false?

100

One pillar of the CIA triad that ensures only authorized users can access resources.

What is confidentiality?

100

This term describes a weakness in hardware, software, or procedures that can be exploited.

What is a vulnerability?

100

This component is considered the brain of the computer.

What is central processing unit (CPU)?

100

The umbrella term to describe malicious software designed to harm, steal, or disrupt

What is malware?

200

Provide two (2) reasons why regulatory compliance is important.

What are any of the following: 

Legal obligation: avoid fines and enforcement actions

Builds trust with customers, partners, and

stakeholders

Encourages baseline security practices and

accountability

200

The CIA triad pillar that ensures information is correct and unaltered.

What is integrity?

200

The chance that a threat will exploit a vulnerability and cause harm is called this.

What is risk (or risk level)?

200

True or false: Microsoft Office 2010 is an example of hardware.

What is false?

200

This type of malware encrypts data until a payment is made.

What is ransomware?

300

Jorge is winning 2K, and Manuel gets jealous and pours coffee on the game console. The game immediately leaves the screen. Which element of the CIA Triad is involved in this element?

What is availability?

300

The CIA triad pillar concerned with systems and data being available when needed.

What is availability?

300

Fill in the blank with a vocab word from this week: Jane installed wooden panels on her home's windows before a hurricane came to __________ its impact.

What is mitigate?

300

Provide three (3) examples of output devices.

What are any of the following: monitor, speaker, headphones, 3-d printer, paper printer

300

The difference between a virus and a worm

What is worms are self-spreading, while viruses need user action?

400

What does PII stand for?

What is Personally Identifiable Information?

400

A hacker who uses skills to find and fix security flaws for organizations, often with permission and ethical intent.

What is a white hat hacker?

400

What's included in an organization's cyberattack surface?

What are all points an attacker can use:

internet-facing systems, user devices, cloud services, third-party integrations, APIs, wireless networks

OR examples?

400
This component directs traffic and data between the internet and all devices connected to it.

What is router (or modem)?

400

What is a Trojan horse?

What is malicious software that disguises itself as something harmless?
500

True or false: All blue hat hackers are white hat hackers, but not all white hat hackers are blue hat hackers.

What is true?

500

A hacker who is still new to hacking and often uses pre-made codes and scripts.

What is a script kiddie OR green hat hacker?

500

Name at least one (1) issue that could arise from an attack on a city's critical infrastructure?

What are any of the following: 

service disruptions, public safety threats, and economic impact?

500

The component connects all components together.

What is motherboard?

500

Complete this sentence: Marcie hacked into her neighbor's Roomba smart vacuum and got the layout of their house to rob it. This is just 1 example of how _______ devices can be dangerous.

What is Internet of Things (IoT)?