Passwords & Authentication
Cyber Attacks
Security Best Practices
Famous Hacks
Cyber Hygiene
100

What is the recommended minimum length of a secure password?

What is 12 characters?

100

A fraudulent email designed to steal sensitive information is called?

What is phishing?

100

Always update this to fix known vulnerabilities.

What is software/operating system?

100

In 2013, this retailer was breached, exposing 40 million credit cards.

What is Target?

100

Before clicking a link in an email, you should always do this.

What is hover over the link to preview the URL?

200

What extra layer of protection requires a code from your phone or email to log in?

What is multi-factor authentication (MFA/2FA)?

200

An attacker who floods a server with traffic to make it unavailable is launching what?

What is a DDoS attack?

200

A private, encrypted network over the internet is called?

What is a VPN (Virtual Private Network)?

200

In 2017, this ransomware attack affected hospitals in the UK.

What is WannaCry?

200

Public Wi-Fi is risky because it often lacks this.

What is encryption?

300

What type of password attack uses a list of common words and phrases?

What is a dictionary attack?

300

Malware that locks files and demands payment is called this?

What is ransomware?

300

The principle of giving users the least amount of access needed is called?

What is the principle of least privilege?

300

This major credit bureau suffered a breach in 2017 affecting 147 million people.

What is Equifax?

300

This type of scam call tricks you into giving away personal info.

What is vishing (voice phishing)?

400

Reusing the same password across accounts increases what kind of risk?

What is a credential stuffing attack?

400

When hackers trick employees into giving access, it’s called this?

What is social engineering?

400

Before donating or discarding old hardware, organizations should do this to the device.

What is wipe/securely erase or physically destroy the data drive?

400

In 2014, this entertainment company was hacked, leaking movies and emails.

What is Sony Pictures?

400

A safe practice for USB drives is to always do this before using one.

What is scan for malware/viruses?

500

A password that looks random but uses a pattern like “P@ssw0rd123!” is vulnerable to what kind of attack?

What is a pattern-based cracking attack (or hybrid attack)?

500

A zero-day exploit targets this?

What is a previously unknown software vulnerability?

500

A security policy that assumes no user or device is trusted by default is known as this.

What is Zero Trust security?

500

In 2016, hackers leaked emails from this U.S. political organization.

What is the Democratic National Committee (DNC)?

500

This rule of cybersecurity states that “If you don’t need it, don’t keep it.”

What is data minimization?