Cybersecurity Fundamentals
Types of Cyber Attacks
Cybersecurity Tools and Technologies
Notable Cyber Incidents
Cybersecurity Companies and Figures
100

In the context of password generation, for what does the acronym OTP stand? The term dynamic password is often used synonymously with OTP.

One-time password

100

A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack?

Phishing


100

When a password is limited strictly to numeric characters, the secret is often referred to as a PIN. What does that acronym stand for?

Personal Identification Number

100

On June 7, 2021, the Department of Justice announced that it had seized approximately $2.3 million worth of what cryptocurrency from the Darkside Colonial Pipeline hackers?

Bitcoin

100

Deepwatch is a cybersecurity company that has offers threat management with real time monitoring since 2015. It is headquartered in what state that's home to Rocky Mountain National Park?

Colorado

200

What term is used for the most basic level or core of an operating system, responsible for resource allocation, file management and security? In a different context, this word can also mean the seed and hard husk of a cereal.

Kernel

200

Although cartoon bears might like it, a hacker might not enjoy being tricked into hacking what sweet-sounding, eight-letter decoy computer system that's purposely made to attract attackers to gain insight into how to decrease cybersecurity threats?

Honeypot

200

What “B” is a type of identity-based data whose examples include fingerprints, DNA, and handwritten text?

Biometric

200

In 2022, which government entity got told off for requiring American citizens to verify their identity with a facial recognition program (ID.me) before they could get their tax records?

Internal Revenue Service

200

Massimiliano Montoro developed a password cracking tool for Windows that was named after what biblical pair of brothers with a notable, fatal head-cracking in their story?

Cain and Abel

300

If you want to make sense of ciphertext, you’ll need a key to decrypt it. What’s the name for the readable, plain language text it turns into?

Plaintext

300

It sounds like something a hacking hound would do, but which term describes watching for and catching data packets passing through a network’s traffic?

Sniffing

300

What colorful term is given to a security mechanism prohibiting the execution of any program that is not on a pre-approved list of software?

Whitelist

300

Titan Rain was a series of attacks on U.S. computers that started in 2003. The hackers gained access to defense networks at places like Lockheed Martin and NASA. Which country did the attacks originate from?

China

300

The "man without a head" is the emblem of what Guy Fawkes-lovin' hacker group that reemerged in 2020?

Anonymous

400

Which term is used to describe the “cargo” that malware brings with it when it infects a device?

Payload

400

A cyberattack in which the attacker intercepts and alters data as it is transmitted between two parties is known as an MitM attack - what do the letters MitM stand for?

Man-in-the-middle

400

Which cybersecurity framework states that a network is always at risk from outside and inside threats, that every user should be verified every time, and that users should only have as much access as they need?

ZeroTrust

400

In June 2022, which Maryland-based global hotel chain experienced its third major cybersecurity breach in four years, with guest credit card data and internal business info being among the data compromised by the hack (which was an attempt to extort money from the company)?

Marriott

400

According to its website, what cybersecurity company – whose motto is “Human error. Conquered.” – deems itself as the “world’s first and largest New-school security awareness training and simulated phishing platform”?

KnowBe4

500

According to the National Initiative for Cybersecurity Careers and Studies, what "A" word means "an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities?"

Adversary

500

What is the two word term for the type of cybersecurity breach in which a user is convinced to disclose secrets due to an exploitation of trust and reliance on cognitive biases? In short, this is a type of attack focused on human gatekeepers of information rather than the computer system itself.

Social engineering

500

In 2017 and 2018, "CryptoKitties" were sold for thousands of dollars at auction, attracting attention to this game which was built on what type of cryptographic technology?

Blockchain

500

Known for apps like Words With Friends and Draw Something, what game company suffered a password breach of more than 170 million accounts in September 2019?

Zynga

500

Formally approved by the U.S. Department of Defense, what is the name of the information security certification known by a five-letter initialism with ~148,000 qualified holders as of January 20211? The organization overseeing this certification was formed in mid-1989 as a non-profit.

CISSP