Having multiple steps to logging in
2 way authentication
A major ransomware attack in 2017 that targeted computers running Windows OS
what is WannaCry
The term used to describe a computer programmer who tries to gain unauthorized access into a network or computer systems with malicious intent
What is a Hacker
People certified in this are skilled on Trojan,worms and viruses ,sniffers and other ethical hacking terms
What is CEH(Certified Ethical Hackers)
What is a standalone malware computer program that replicates itself in order to spread to other computers.
Answer: Worm
Going only on websites with HTTPS
avoiding untrusted websites
What was hacked in the Target breach of 2013
what is customer data
a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorization of a system entity that invokes the program
What is a Trojan Horse
This is top certification if you want to manage,develop,and oversee
What is CISM Certified Information Security Manager.
What is a software that aims to gather information about a person or organization, sometimes without their knowledge,
What is a spyware
Saving your computer data onto archive file in case of an emergency
data backup
Who was hacked by the “Guardians of Peace” in 2014 that leaked confidential data from a film studio
Who is Sony Pictures
An attack on trusted and otherwise secure websites, by injecting malicious scripting. Attackers target websites that do not filter user inputs for strings or common characters in a script.
What is Cross-Site Scripting
People with these certification are told to have superior technical skills, overall knowledge, and experts in multiple security fields
.What is Security+
What is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed and often masks its existence or the existence of other software
rootkit
Not going on public wifi
Using VPN to create a secure connection
A mysterious group who breached the NSA and auctioned off the data are known as
Who are The Shadow Brokers
The process of finding the solution by constantly trying many probable variants of information such as passwords, deciphered keys, etc., in a random fashion
What is a Brute Force Attack
People with this certification are serious about their careers in IT.What is CISSP
(Certified information security professional)
What is a standalone malware computer program that replicates itself in order to spread to other computers.
Answer: Worm
Constantly updating your cyber security methods
Upgrading antivirus software
A major data breach of a major consumer credit agency
Equifax
A user or a program that has highly sophisticated techniques and intends to pursue them with a malicious intent.
What is an Advanced Persistent Threat
This certification is the highest priced certification.
What is GSEC
What is a malicious computer program which misleads users of its true intent.
Answer: Trojan horse