Cybersecurity Basics
Passwords
Security
Gone Phishing
Attack Vectors
100

This term refers to the protection of computer systems, networks, and data from theft, damage, or unauthorized access.

What is Cybersecurity?

100

True or False: A strong password should include upper and lowercase letters, numbers and symbols.

What is True?

100

True or False: it is best lock your computer whenever you leave it unattended.

What is true?

100

This type of phishing is a targeted attack.

What is spearphishing?

100

Software created by hackers with the intention of stealing data and/ or damaging our internal systems is known as.

What is malware?

200

A secure, private network that you can connect to over the internet.

What is a VPN (Virtual Private Network)?

200

The term for a tool that securely stores and manages passwords for various accounts.

What is a password manager or vault?

200

Using barriers, locks, and access control systems to restrict entry to authorized personnel only is a form of ____________ security.

What is physical?

200

This type of phishing attack uses phone calls or voice messages to deceive individuals into providing sensitive information or performing certain actions.

What is vishing?

200

This type of malware replicates itself to spread to other computers.

What is a virus or worm?

300

This common cybersecurity threat involves tricking individuals into disclosing sensitive information or clicking on malicious links through deceptive emails or websites.

What is phishing?

300

The recommended minimum length for a strong password.

What is 15 characters?

300

Security method that requires users to provide two or more different forms of verification to gain access to an account or system.

What is Multi-factor authentication (MFA)?

300

This variant targets high-ranking individuals or executives within an organization, aiming to steal sensitive information or gain unauthorized access to corporate networks.

What is whaling?

300

This malware type is designed to block access to a computer system until a sum of money is paid.

What is ransomware?

400

This is the process of converting information or data into a code to prevent unauthorized access.

What is encryption? 

400

Easily guessed or cracked by unauthorized users, often because it is short, uses common words like "password" or predictable sequences like "1234," lacks complexity, or contains personal information.

What is a weak password?

400

Refrain from sharing personal identifiable information, financial details, passwords, private or confidential information with this learning model.

What is AI (Artificial Intelligence)?

400

This type of phishing involves a SMS text message.

What is smishing?

400

An approach to gain access to information through misrepresentation commonly by impersonation.

What is social engineering?

500

 This security measure involves confirming the identity of users or systems before granting access to resources or data, typically through passwords, biometrics, or security tokens.

What is authentication?

500

This type of authentication method involves using a sequence of words or a sentence as a password, typically longer and more memorable than traditional passwords.

What is a passphrase?

500

Any information that can be used to identify a specific individual, either directly or indirectly.

What is PII (Personally Identifiable Information)?

500

This technique uses fraudulent emails that appear to come from a legitimate sender, such as a bank or government agency, to trick recipients into taking action.

What is email spoofing?

500

Infection of this is typically from email attachments or spoofed websites.

What is malware or ransomware?