Which of these terms is NOT a type of cyber phishing [A] Smishing, [B] Wishing [C] Quishing [D] Vishing
What is: [B] Wishing
What is the first thing you should do if you are a victim of a cyber attack? [A] Negotiate with the hacker [B] Ignore the threat [C] See something, say something [D] Call the Police
What is: [C] See Something, Say Something?
Malicious programs that extort money from their victims by blocking access to the computer or encrypting the data stored on it until the victim pays. [A] Ransomware [B] Cryptominer [C] Cryptopunk [D] Locker
What is: [A] Ransomeware?
Which of the following communication channels are most used in phishing attempts? [A] Email [B] Phone Call [C] Text message [D] Social Media
What is: [A] Email?
In 2015, over 25 gigabytes of user data was famously leaked by a group self-named "The Impact Team", exposing people on which Canadian dating network? [A] Ashley Madison [B] Ainsley Madeleine [C] Anna Marie [D] Abby Morgan
What is: [A] Ashley Madison?
What is the term in network security for an attack where a person or program allows themselves to be identified as someone else by falsifying data? [A] Virus [B] Spoof [C] Malware [D] Spam
[B] Spoof
Employing a ______ trust strategy means that every user has to be authenticated no matter what. [A] Encrypted [B] MFA [C] Zero [D] Anti
What is: [C] Zero?
Social ______ is the name of the cybersecurity threat where actors trick others into revealing sensitive information. [A] Hacking [B] Engineering [C] Phishing [D] Scamming
[B] Engineering
You receive an email from an online shopping site claiming that you were incorrectly charged for your last purchase and are due a refund. The email asks you to click a link where you will submit the necessary information. What should you do?
[A] Do NOT click the link! [B] Check the sender’s address [C] If you notice anything suspicious, report the email [D] All of the Above
What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016? [A] Facebook [B] LinkedIn [C] Twitter [D] Instagram
What is: [B] LinkedIn?
A security measure that requires users to provide two different forms of identification to access a mobile device or app.
What is two-factor authentication? (Will also accept 2FA or MFA.)
A combination of uppercase and lowercase letters, numbers, and special characters at least 16 characters long.
What is a strong password?
This standard establishes expected, acceptable, behavior for workers using or accessing Information Systems.
What is the IT Policies & Procedures document?
A service that store your passwords in an encrypted vault that can only be unlocked with a single master password.
What is a Password Manager (will also accept What is Password Secure)?
This film depicts a dystopian future in which humanity is unknowingly trapped inside a simulated reality that intelligent machines have created to distract humans while using their bodies as an energy source.
What is The Matrix (1999)?
Short for "malicious software," refers to any software intentionally designed to cause damage, disrupt operations, or gain unauthorised access to computer systems
What is malware?
A cyber attack where attackers impersonate a trustworthy entity to trick individuals into revealing sensitive information.
What is Phishing?
If using a windows-based PC, you do this to QUICKLY lock your computer before stepping away.
What is press the Windows key and the letter L?
The protection of personal information and ensuring that it is collected, used and stored securely and in accordance with applicable laws and regulations.
What is Data Privacy?
Matthew Broderick plays a high-school aged computer whiz who accidentally accesses a military computer programmed to simulate... well, precisely what the title suggest.
What is WarGames (1983)?
Malicious software that disguises itself as a legitimate program.
What is a Trojan Horse?
A security measure that restricts entry to authorised individuals.
What is Access Control?
The process of converting data into an unreadable format to protect it from unauthorised access.
What is encryption?
A security device that monitors and controls incoming and outgoing network traffic.
What is a firewall?
Sandra Bullock stars as a systems analyst who works remotely in California and becomes embroiled in a deadly conspiracy after receiving a mysterious floppy disk that backdoors in to a well-known computer security system.
What is The Net (1995)?