Which of these terms is NOT a type of cyber phishing [A] Smishing, [B] Wishing [C] Quishing [D] Vishing
What is: [B] Wishing
In 2015, over 25 gigabytes of user data was famously leaked by a group self-named "The Impact Team", exposing people seeking extramarital affairs on which two-word Canadian dating network? [A] Ashley Madison [B] Ainsley Madeleine [C] Anna Marie [D] Abby Morgan
What is: [A] Ashley Madison?
What is the first thing you should do if you are a victim of a cyber attack? [A] Negotiate with the hacker [B] Ignore the threat [C] See something, say something [D] Call the Police
What is: [C] See Something, Say Something?
What is the weakest link in cybersecurity? [A] Weak encryption [B] People inside the organization [C] Short passwords [D] Lack of Anti-Virus software
What is: [B] People inside the organization?
Malicious programs that extort money from their victims by blocking access to the computer or encrypting the data stored on it until the victim pays. [A] Ransomware [B] Cryptominer [C] Cryptopunk [D] Locker
What is: [A] Ransomeware?
If a friendly horse offers you something online that turns out to be malware, that's a cyberattack named for a siege on what ancient city? [A] Troy [B] Paris [C] Sydney [D] Berlin
What is: [A] Troy?
According to the AESARA's password policy all the passwords must be changed on at least on [A] Monthly basis [B] Every other month basis [C] Quarterly basis [D] Semi-annual Basis
What is: [C] Quarterly basis
What’s the best way to secure a weak password like “monkey123”? [A] Add an uppercase numeral and a special character, such as $ [B] Don’t reuse it anywhere else or share it with anyone [C] Enable two-factor authentication [D] Reset the password weekly
What is: [C] Enable two-factor authentication?
In the context of password generation, for what does the acronym OTP stand? [A] Over the Password [B] One Touch Password [C] One Time Password [D] Operator Training Password
What is: [B] One Touch Password?
According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, what is the most common six-letter "word" that is used for passwords that don't require numbers or punctuation? [A] iloveu [B] asdasd [C] qwerty [D] monkey
What is: [C] qwerty?
What is the simplest way to stop brute-force cyberattacks dead in their tracks? [A] Shred all paperwork containing sensitive information [B] Add a deadbolt lock to all entryways [C] Add a few unique characters to any password or PIN [D] Call the Police
What is: [C] Add a few unique characters to any password or PIN
An attack that is designed to hinder or stop the normal functioning of a website, server, or other network resource. [A] Spoofing [B] DoS Attack [C] POS Attack [D] Hoak
What is: [B] DoS Attack?
Which of the following communication channels are most used in phishing attempts? [A] Email [B] Phone Call [C] Text message [D] Social Media
What is: [A] Email?
What is the term in network security for an attack where a person or program allows themselves to be identified as someone else by falsifying data? [A] Virus [B] Spoof [C] Malware [D] Spam
[B] Spoof
What “J” cybersecurity company based out of Denver, CO offers an MFA and user password resets? [A] Juniper [B] JumpSeat [C] JamPro [D] JumpCloud
What is: [D] JumpCloud?
Employing a ______ trust strategy means that every user has to be authenticated no matter what. [A] Encrypted [B] MFA [C] Zero [D] Anti
What is: [C] Zero?
What are the common goals of criminals behind a cyber attack? [A] To disrupt an organization's operations [B] To spread useful information [C] To install bugs and viruses to infect the computer [D] To steal information from an individual or business
What is: [D] To steal information from an individual or business?
Social ______ is the name of the cybersecurity threat where actors trick others into revealing sensitive information. [A] Hacking [B] Engineering [C] Phishing [D] Scamming
[B] Engineering
What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016? [A] Facebook [B] LinkedIn [C] Twitter [D] Instagram
What is: [B] LinkedIn?
AESARA has the following security policies (SOPs): [A] Information Security Policy, [B] Information Privacy Policy, [C] Social Media Policy [D] Dress Code Policy
What is: [A] Information Security Policy
Which of the following malware type allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computer? [1] Rats [2] Worms [3] Rootkits [4] Botnets
What is: [A] RATs
Explanation: The RAT is an abbreviation of Remote Access Trojans or Remote Administration Tools, which gives the total control of a Device, which means it, can control anything or do anything in the target device remotely. It allows the attacker administrative control just as if they have physical access to your device.
An attack that is designed to hinder or stop the normal functioning of a website, server, or other network resource.
What is: [B] Humans?