Social Engineering
Passwords
Malware
Mixed Bag
100

Typically using spoofed email addresses and links to trick people into providing login credentials, credit card numbers, or other personal information.

What is Phishing?

100

Use upper and lower-case letters, numbers, and THESE to create complex passwords

What are Symbols? 

100

This 'Germy' malware spreads from machine to machine with human assistance

What is a virus?

100

A phone call or email from an unknown person or company is this... Not to be confused with canned meat!

What is Spam?

200

In these attacks, someone without the proper authentication follows an authenticated employee into a restricted area.

What is Tailgating?

200

This lets you store all of your passwords in one place.

What is a Password Manager / Password Management System?

200

Scammers hold your computer hostage with this kind of malware

What is Ransomware? 

200

These people are considered "good guy" hackers.

Who are White Hat Hackers?

300

A social engineering attack conducted specifically through SMS messages

What is Smishing / SMS-phishing?

300

THIS requires that more than one credential is entered to access an account.

What is Two-Factor Authentication / Multi-Factor Authentication? 

300

This type of program has a hidden malicious function. (Also how Greek soldiers were able to take the city of Troy).

Who is a Trojan Horse?

300

This redirects your internet traffic and helps hide your location.

What is a Virtual Private Network (VPN).

400

When a fraudster attempts to trick a victim into disclosing sensitive information or giving them access to the victim's computer over the telephone.

What are Vishing?

400

'Whd@b33f!' is an example of this

What is Passphrase?

400

This malware is able to spread without human assistance.

What is a Worm?

400

What does iOT stand for?

What is Internet of Things?

500

A type of phishing attack that targets one person, typically a high-level executive, that often has huge payoffs as the targets has access to high value data.

What is Whaling?

500

6-12 months is the recommended frequency to do this

What is Change Your Password?

500

This malware collects your information without your knowledge or consent. 

What is Spyware?

500

What are the 3 components the CIA Triad?

What is Confidentiality, Integrity, and Availability.