Hackers
Best practices
Malware types
Miscellaneous
100

Someone who uses their hacking skills for legal, and ethical purposes is a ____?

White Hat hacker

100

What is a keylogger?

A tool that logs, and saves every keystroke on a computing device

100

How long are your posts on social media sites?

Forever

200

Define a hacker

Someone who uses a computer to gain access to systems or networks.

200

How many characters should your password be at a minimum?

8

200

A trojan is named after which culture's mythology?

Greek

200

What is the definition of CyberSecurity?

The collection of security tools, policies, safeguard, and practices that protect the cyberspace environment and its occupants.

300

A grey hat hacker is: 

A hacker who violates networks, and computer systems, but do not have malicious intent.

300

When accessing sensetive information over public networks, one should us a ____?

VPN

400

What are 3 ways you could identify phishing emails?

1. Email sounds too good to be true, 2. you do not recognize the sender, 3. the email pressures you to act without thinking,4. the message contains unexpected attachments, 5. The message contains text or URLs that look suspicious 6. The logo of the sending organization does not look exactly right

500

What is the difference between a virus, and a worm?

A virus needs human interaction to reproduce and run whereas a worm does not