Encryption & Cryptography
Cyber Threats & Attacks
Surprise! (PT 1)
Authentication & Security Practices
Surprise! (PT 2)
100

This process scrambles data so only authorized users can read it.

What is encryption?

100

Malicious software that harms computers.

What is malware?

100

This animal is known for changing its color to blend into its surroundings.

What is a chameleon?

100

A secret word or phrase used to log in.

What is a password?

100

This singer is known for the album Midnights and the Eras Tour.

Who is Taylor Swift?

200

This type of encryption uses one shared key.

What is symmetric encryption?

200

Fake emails or messages used to steal personal information.

What is phishing?

200

The name of the first and most widely used cryptocurrency, created in 2009. 

What is Bitcoin?

200

This is used by a browser to verify that a website's public key actually belongs to the intended entity, helping to establish trust and ensure a secure HTTPS connection.

What is a Digital Certificate?

200

This quarterback led the Seahawks to a 2026 Super Bowl victory. 

Who is Sam Darnold?

300

This type of encryption uses a public key and a private key.

What is asymmetric encryption?

300

An attack that overwhelms a website with traffic.

What is a DDoS attack?

300

This African country has the most pyramids in the world - more than Egypt. 

What is Sudan?

300

This security method requires a user to provide at least two separate forms of evidence—such as a password and a code sent to a phone—to verify their identity before gaining access.

What is MFA? (Multi-Factor Authentication)

300

This rapper, born Shawn Carter, is also a business mogul behind Roc Nation. 

Who is Jay-Z?

400

This type of cipher shifts each letter in the alphabet by a fixed number of positions. 

What is Caesars Cipher?

400

Software that locks your files and demands payment.

What is ransomware?

400

In this sci-fi netflix series, each episode explores the dark side of technology and social media in standalone stories

What is Black Mirror?

400

This type of cybersecurity attack occurs when an unauthorized individual sets up a fake, unsecured wireless access point to intercept data from unsuspecting users.

What is a Rogue Access Point?

400

This famous halftime show performer headlined the Super Bowl in 2023.

Who is Rihanna?

500

This type of attack tries every possible key or password until the correct one is found. 

What is brute force?

500

In addition to phishing, this concept is based on tricking people into giving away information instead of hacking systems directly.

What is social engineering?

500

In this 2014 film, humanity escapes a dying earth through a wormhole near Saturn.

What is Interstellar?

500

While firewalls check for malicious network traffic, this specific type of hardware or software, which captures keystrokes before they are encrypted by browser-level HTTPS, bypasses traditional authentication security, making it a critical threat to user credentials.

What is a Keylogger?

500

This athlete has won multiple Olympic gold medals in swimming and is one of the most decorated Olympians ever.

Who is Michael Phelps?