Cyber Terminology
Cyber World
Cyber Safety
Cyber Malware
Cyber Security
100

Which of these terms is NOT a type of cyber phishing [A] Smishing, [B] Wishing [C] Quishing [D] Vishing

What is: [B] Wishing

100

In 2015, over 25 gigabytes of user data was famously leaked by a group self-named "The Impact Team", exposing people seeking extramarital affairs on which two-word Canadian dating network? [A] Ashley Madison [B] Ainsley Madeleine [C] Anna Marie [D] Abby Morgan

What is: [A] Ashley Madison?

100

What is the first thing you should do if you are a victim of a cyber attack? [A] Negotiate with the hacker [B] Ignore the threat [C] See something, say something [D] Call the Police

What is: [C] See Something, Say Something?

100
A type of Malware, that delivers those pesky pop-ups of some products and similar stuff: [A] Popware [B] Freeware [C] Adware [D] Cookware
What is: [A] Adware?
100

What is the weakest link in cybersecurity? [A] Weak encryption [B] People inside the organization [C] Short passwords [D] Lack of Anti-Virus software

What is: [B] People inside the organization?

200

Malicious programs that extort money from their victims by blocking access to the computer or encrypting the data stored on it until the victim pays. [A] Ransomware [B] Cryptominer [C] Cryptopunk [D] Locker

What is: [A] Ransomeware?

200

If a friendly horse offers you something online that turns out to be malware, that's a cyberattack named for a siege on what ancient city? [A] Troy [B] Paris [C] Sydney [D] Berlin

What is: [A] Troy?

200

According to the AESARA's password policy all the passwords must be changed on at least on [A] Monthly basis [B] Every other month basis [C] Quarterly basis [D] Semi-annual Basis

What is: [C] Quarterly basis

200
A type of Malware, that disguises itself as a normal program to trick users into downloading and installing malware: [A] Ebola [B] Trojan [C] Bug [D] Bot
What is: [B] Trojan?
200

What’s the best way to secure a weak password like “monkey123”? [A] Add an uppercase numeral and a special character, such as $ [B] Don’t reuse it anywhere else or share it with anyone [C] Enable two-factor authentication [D] Reset the password weekly

What is: [C] Enable two-factor authentication?

300

In the context of password generation, for what does the acronym OTP stand? [A] Over the Password [B] One Touch Password [C] One Time Password [D] Operator Training Password

What is: [B] One Touch Password?

300

According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, what is the most common six-letter "word" that is used for passwords that don't require numbers or punctuation? [A] iloveu [B] asdasd [C] qwerty [D] monkey

What is: [C] qwerty?

300

What is the simplest way to stop brute-force cyberattacks dead in their tracks? [A] Shred all paperwork containing sensitive information [B] Add a deadbolt lock to all entryways [C] Add a few unique characters to any password or PIN [D] Call the Police

What is: [C] Add a few unique characters to any password or PIN

300

An attack that is designed to hinder or stop the normal functioning of a website, server, or other network resource. [A] Spoofing [B] DoS Attack [C] POS Attack [D] Hoak

What is: [B]  DoS Attack?

300

Which of the following communication channels are most used in phishing attempts? [A] Email [B] Phone Call  [C] Text message [D] Social Media

What is: [A] Email?

400

What is the term in network security for an attack where a person or program allows themselves to be identified as someone else by falsifying data? [A] Virus [B] Spoof [C] Malware [D] Spam

[B] Spoof

400

What “J” cybersecurity company based out of Denver, CO offers an MFA and user password resets? [A] Juniper [B] JumpSeat [C] JamPro [D] JumpCloud

What is: [D] JumpCloud?

400

Employing a ______ trust strategy means that every user has to be authenticated no matter what. [A] Encrypted [B] MFA [C] Zero [D] Anti

What is: [C] Zero?

400
Viruses, worms, bots, phishing and the like in context of computers are examples of: [A] Firmware [B] Hardware [C] Malware [D] Spamware
What is: [C] Malware?
400

What are the common goals of criminals behind a cyber attack? [A] To disrupt an organization's operations [B] To spread useful information [C] To install bugs and viruses to infect the computer [D] To steal information from an individual or business

What is: [D] To steal information from an individual or business?

500

Social ______ is the name of the cybersecurity threat where actors trick others into revealing sensitive information. [A] Hacking [B] Engineering [C] Phishing [D] Scamming

[B] Engineering

500

What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016? [A] Facebook [B] LinkedIn [C] Twitter [D] Instagram

What is: [B] LinkedIn?

500

AESARA has the following security policies (SOPs): [A] Information Security Policy, [B] Information Privacy Policy, [C] Social Media Policy [D] Dress Code Policy

What is: [A] Information Security Policy

500

Which of the following malware type allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computer? [1] Rats [2] Worms [3] Rootkits [4] Botnets

What is: [A] RATs 

Explanation: The RAT is an abbreviation of Remote Access Trojans or Remote Administration Tools, which gives the total control of a Device, which means it, can control anything or do anything in the target device remotely. It allows the attacker administrative control just as if they have physical access to your device.

500

An attack that is designed to hinder or stop the normal functioning of a website, server, or other network resource.

What is: [B] Humans?