Cyber Terminology
Cyber World
Cyber Safety
Cyber Security
100

Which of these terms is NOT a type of cyber phishing 

[A] Smishing [B] Wishing [C] Quishing [D] Vishing

[B] Wishing

100

In 2015, over 25 gigabytes of user data was famously leaked by a group self-named "The Impact Team", exposing people seeking extramarital affairs on which two-word Canadian dating network? 

Ashley Madison

100

What does HIPAA stand for? 

Health Insurance Portability and Accountability Act

100

What is the weakest link in cybersecurity? 

People inside the organization

200

Malicious programs that extort money from their victims by blocking access to the computer or encrypting the data stored on it until the victim pays. 

Ransomware

200

If a friendly horse offers you something online that turns out to be malware, that's a cyberattack named for a siege on what ancient city? 

Troy (Trojan Horse)

200

According to the Terrebonne General's password policy, all passwords must be changed after how many days?

90 Days

200

Which platform is responsible for housing all policies, particularly security policies, for Terrebonne General?

PolicyTech

300

What acronym is used to describe everyday objects that are connected to the internet and are able to collect and transfer data automatically? 

[A] IpS [B] TBD [C] IoT [D] VPN

[C] IoT (Internet of Things)

300

How many patients were potentially affected following the Baton Rouge Clinic cyber attack on their EHR system in 2020? 

[A] 50,000 [B] 120,000 [C] 310,000 [D] 422,000

[C] 310,000

300

This authentication method is the best way to restrict access to your files and devices? 

Multi-Factor/Two-Factor

300

What communication channel is used in smishing attempts?

text messages

400

What is the term in network security for an attack where a person or program allows themselves to be identified as someone else by falsifying data? 

[A] Deep Fake [B] Spoof [C] Malware [D] Spam

[B] Spoof

400

Which Louisiana governmental department or entity was affected by the MoveIt security breach in 2023?

Louisiana Department of Transportation

400

Employing a ______ trust strategy means that every user has to be authenticated no matter what. [A] Encrypted [B] SUS [C] Zero [D] Anti

[C] Zero

400

What are the common goals of criminals behind a ransomware attack? [A] To disrupt an organization's operations [B] Revenge [C] To install bugs and viruses to infect the computer [D] To steal information from an individual or business 

[D] To steal information from an individual or business

500

Social ______ is the name of the cybersecurity threat where actors trick others into revealing sensitive information. 

Engineering

500

What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016? 

LinkedIn

500

______ phishing is a type of phishing assault that targets a small number of high-value targets, usually just one.

Spear

500

What is the average cost of a data breach in the U.S.? 

[A] 9.5 Million [B] 15 Million [C] 1 Billion [D] $20 and a Costco membership [E] 5 Million [F] 1.5 Billion

[A] 9.5 Million