Protection
Attacks
General Security Information
General IT
Names
100

Fill in the blank: As cybersecurity threats grow, many websites have evolved to include this increased security feature known as _____.

multifactor authentication

100

A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack, which is by far the most common cyberattack on the internet?

Phishing

100

When a password is limited strictly to numeric characters, the secret is often referred to as a PIN. What does that acronym stand for?


Personal Identification Number

100

Stored digital data is said to be “at” what if it’s inactive? (Hint: As opposed to being “in motion” when moving in a network)


Rest

100

If a friendly horse offers you something online that turns out to be malware, that's a cyberattack named for a siege on what ancient city?


Troy

200

The process of converting plaintext into another format that cannot be decoded without a key.


Encryption

200

What is a common method for attackers to guess passwords by trying many combinations quickly

Brute force attack

200

Being a ______ Ethical Hacker (CEH) means you’ve been trained to hack into your own system to test it for weaknesses and vulnerabilities.


Certified

200

Which term describes the underlying cybersecurity structure, as well as the technology and policies that support it?


Architecture

200

What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016?


Linkedin

300

A software that will secure data copied on a device placed into your computer.

disk or device encryption

300

What is the term for a simulated cyber-attack conducted by an organization to test its incident response capabilities?


Red team exercise

300

What type of security technology allows organizations to monitor and analyze user and system activities?


SIEM (Security Information and Event Management)

300

The global, hypermedia-based collection of information and services that is available on internet servers


World Wide Web

300

What “M” computer security company, founded by namesake John in 1987 before being acquired by Intel in 2011, is well known for its anti-virus software that is available to individual consumers?


McAfee

400

Employing a ______ strategy means that every user has to be authenticated no matter what. Whether someone is an authorized user in your organization or someone from outside of it, they have to be verified every time.


Zero trust  

400

What was the first widely recognized computer virus that appeared in the early 1970s?


Creeper Virus

400

What is the term for the process of ensuring the authenticity and integrity of data through cryptographic means?


Data Integrity

400

Botnets can flood a Web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. What is this called?


Denying services

400

What is the name of the software framework developed and maintained by Microsoft that was first built in the late 1990s and continues to primarily run on Windows machines with the C# language? Fun fact: this is a key piece of the Water Cooler Trivia stack.


NET

500

Named after a mythical creature, this type of cyber-attack involves infiltrating a network to stay undetected for an extended period


"TLS" (Transport Layer Security)

500

In what year did the Stuxnet worm, designed to target industrial control systems, become public knowledge?

2010

500

What is "the central hub responsible for monitoring, detecting, and responding to security incidents and threats within an organization's network"?


Security Operations Center

500

On June 7, 2021, the Department of Justice announced that it had seized approximately $2.3 million worth of what cryptocurrency from the Darkside Colonial Pipeline hackers?


bitcoin

500

Massimiliano Montoro developed a password cracking tool for Windows that was named after what biblical pair of brothers with a notable, fatal head-cracking in their story?


Cain and Abel