Category 1
Category 2
Category 3
Category 4
Just for Fun
100

Which of these terms is NOT a type of cyber phishing [A] Smishing, [B] Wishing [C] Quishing [D] Vishing

What is: [B] Wishing

100

What is the first thing you should do if you are a victim of a cyber attack? [A] Negotiate with the hacker [B] Ignore the threat [C] See something, say something [D] Call the Police

What is: [C] See Something, Say Something?

100

Malicious programs that extort money from their victims by blocking access to the computer or encrypting the data stored on it until the victim pays. [A] Ransomware [B] Cryptominer [C] Cryptopunk [D] Locker

What is: [A] Ransomeware?

100

Which of the following communication channels are most used in phishing attempts? [A] Email [B] Phone Call  [C] Text message [D] Social Media

What is: [A] Email?

100

In 2015, over 25 gigabytes of user data was famously leaked by a group self-named "The Impact Team", exposing people on which Canadian dating network? [A] Ashley Madison [B] Ainsley Madeleine [C] Anna Marie [D] Abby Morgan

What is: [A] Ashley Madison?

200

What is the term in network security for an attack where a person or program allows themselves to be identified as someone else by falsifying data? [A] Virus [B] Spoof [C] Malware [D] Spam

[B] Spoof

200

Employing a ______ trust strategy means that every user has to be authenticated no matter what. [A] Encrypted [B] MFA [C] Zero [D] Anti

What is: [C] Zero?

200

Social ______ is the name of the cybersecurity threat where actors trick others into revealing sensitive information. [A] Hacking [B] Engineering [C] Phishing [D] Scamming

[B] Engineering

200

You receive an email from an online shopping site claiming that you were incorrectly charged for your last purchase and are due a refund. The email asks you to click a link where you will submit the necessary information. What should you do?

[A] Do NOT click the link!  [B] Check the sender’s address [C] If you notice anything suspicious, report the email [D] All of the Above

200

What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016? [A] Facebook [B] LinkedIn [C] Twitter [D] Instagram

What is: [B] LinkedIn?

300

A security measure that requires users to provide two different forms of identification to access a mobile device or app.

What is two-factor authentication? (Will also accept 2FA or MFA.)

300

A combination of uppercase and lowercase letters, numbers, and special characters at least 16 characters long.

What is a strong password?

300

This standard establishes expected, acceptable, behavior for workers using or accessing Information Systems.

What is the IT Policies & Procedures document?

300

A service that store your passwords in an encrypted vault that can only be unlocked with a single master password.

What is a Password Manager (will also accept What is Password Secure)?

300

This film depicts a dystopian future in which humanity is unknowingly trapped inside a simulated reality that intelligent machines have created to distract humans while using their bodies as an energy source.

What is The Matrix (1999)?

400

Short for "malicious software," refers to any software intentionally designed to cause damage, disrupt operations, or gain unauthorised access to computer systems

What is malware?

400

A cyber attack where attackers impersonate a trustworthy entity to trick individuals into revealing sensitive information.

What is Phishing?



400

If using a windows-based PC, you do this to QUICKLY lock your computer before stepping away.

What is press the Windows key and the letter L?

400

The protection of personal information and ensuring that it is collected, used and stored securely and in accordance with applicable laws and regulations.

What is Data Privacy?

400

Matthew Broderick plays a high-school aged computer whiz who accidentally accesses a military computer programmed to simulate... well, precisely what the title suggest.  

What is WarGames (1983)?

500

Malicious software that disguises itself as a legitimate program.

What is a Trojan Horse?

500

A security measure that restricts entry to authorised individuals.

What is Access Control?

500

The process of converting data into an unreadable format to protect it from unauthorised access.

What is encryption?

500

A security device that monitors and controls incoming and outgoing network traffic.

What is a firewall?

500

Sandra Bullock stars as a systems analyst who works remotely in California and becomes embroiled in a deadly conspiracy after receiving a mysterious floppy disk that backdoors in to a well-known computer security system.

What is The Net (1995)?