Cyber Terminology
Corporate Terminology
Attacks and Threats
Final Jeopardy
100

What does malware stand for?

Malicious Software

100

What is often the weakest link in a security chain?

Humans

100

What does DDoS stand for

Distributed Denial of Service

200

What does a VPN stand for?

Virtual Private Network

200

What is an insider threats?

An individual within an organization to misuse their access, knowledge, or privileges to cause harm intentionally or unintentionally

200

What is the worst enemy of security?

complexity

300

What is a malicious software that encrypts a user’s files and demands payment for their release?

Ransomware

300

Define Principle of Least Privilege (PoLP)

A concept in information security where a user is granted the minimal access, or permissions, required to carry out their responsibilities.

300

What are the implications of using a public wifi network?

Subjectable to Man in the middle attacks ,Spoofing, Session hijacking

400

What are the 3 forms of authentication?

  • Something you know(pin, password, etc.), something you have(access card, SMS/text, etc.),
    something you are(fingerprints, face recognition)

400

What are the five steps of the software development lifecycle (SDLC)?

Analysis, Design, Implement, Testing, Maintenance

400

When or where was the Computer Misuse Act passed

1990 in the United Kingdom

500

What does PDCAERF stand for?
a) Preparation, Detection, Containment, Analysis, Eradication, Repair, Follow-up
b) Preparation, Determination, Containment, Analysis, Eradication, Repair, Follow-up
c) Preparation, Detection, Containment, Authentication, Encryption, Repair, Follow-up
d) Preparation, Determination, Containment, Analysis, Encryption, Repair, Follow-up

a) Preparation, Detection, Containment, Analysis, Eradication, Repair, Follow-up

500

What is one of the two general goals of social engineering?

Sabotage or Theft

500

Who created the first computer worm

a.) Bob Thomas

b.) Robert Morris

c.) Joseph Popp

D.) onel de guzman:

a.) Bob Thomas

500

Decrypt the following using the chart

Wkh Dqvzhu


The Answer