Call the Exterminator
You've Got Mail
Can't Touch This
To Catch a Thief
Lucy in the sky
100
When an imposter obtains key pieces of personally identifiable information, in order to impersonate someone else.
What is identity theft?
100
The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers
What is a phishing attack?
100
An attack using computers to send millions of message requests to a server with the goal of overwhelming and crashing the server.
What is a DDos (Distributed Denial of Service) attack?
100
A person who uses computers to gain unauthorized access to data.
What is a hacker?
100
You do this before walking away from your workstation or mobile device.
What is press the Windows key and the letter L? (Ctrl+Alt+Del and select "Lock this Computer".
200
A piece of programming code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
What is a computer virus or bug?
200
123456 123456789 qwerty 12345678 111111 1234567890 1234567 password 123123 987654321
The 10 most common passwords. "123456" can be cracked in less than a second.
200
Scams distributed through email such as phishing, pharming and impersonation.
what is Social Engineering?
200
I used it to save on my data plan, but now my bank account is empty.
What is use public wifi? Always use a secure wifi connection.
200
An easily remembered passphrase, substituting 8 or more symbols, numbers, capital and lower-case letters for words. Here’s an example: “I Like To Sing and Take Long Walks” = 1L2$&Tlw
What is a strong password?
300
Criminal activities carried out by means of computers or the internet.
What is Cyber crime?
300
Gift card giveaways, such as a claim that Starbucks is giving out $50 cards. Fake Amber Alerts claiming that a child was abducted and appealing to users to share the message to aid in the search. Product giveaways (offers of free iPads are very common).
What is a Facebook scam?
300
Carried with you and not properly password protected can result in a cyber security breach.
What are mobile devices, such as laptops, cell phones, and flash drives?
300
Where sensitive, protected or confidential data has been potentially viewed, stolen or used by an authorized individual.
What is a data breach?
300
Prevents, searches for, detects and removes malicious software.
What is anti-virus software?
400
A fraudulent scheme in an attempt to obtain money or something else of value.
What is a scam?
400
Most common way computers can get infected by computer viruses.
What is opening attachments or links from unknown or spoofed emails?
400
Every online account should have a different one.
What is have a different password?
400
Small device that scans a credit card and stores the information contained in the magnetic strip.
What is skimming?
400
Done by typing [encrypt] in the subject line.
What is sending an encrypted email?
500
Type of malware installed on a computer without the owner's knowledge in order to collect owner's private information.
What is spyware?
500
Malware that infects a machine, locks the files, then asks for money is known as?
What is Ransomware?
500
Should always be a part of the internet address when shopping.
What is a padlock or https in the URL address? https: is a secure connections between you and the website. Communication between your browser and website are encrypted.
500
The biggest vulnerability to computer information security.
What is end users?
500
Ransomware cyber attack that infected more than 230,000 computers in 150 countries on May 12, 2017.
What is WannaCry (or WannaCrypt, WanaCrypt0r 2.0,Wanna Decryptor)