This is a very common term for a malicious email
Phishing or Phish
Term used to describe impersonating another person's identity
a) Cloning
b) Mirroring
c) Spoofing
Spoofing
Responding to questions on social media about your likes, history, family, data can be used by cybercriminals to attack you and is called:
a) A Breach
b) Interactive Exposure
c) Social Engineering
Social Engineering
This historic attack left many with tears in their eyes
a) WannaCry
b) Diced Onion
c) Blackeye
WannaCry
The term is used to describe a person's ability to keep their information confidential and not divulged without their permission.
Private or Privacy
New technology that uses fingerprints, Iris Scan. or even DNA to verify your identify
a) Genometric Analysis
b) Quantum Computing
c) Biometrics
Biometrics
Term for an exploit that has never been used before?
a) Early Bird
b) Zero-Day
c) Blitz
Zero-Day
This type of cyberattack will make data and files unreadable unless money is paid to release the data
a) Spyware
b) Ransomware
c) Hijacking
Ransomware
Term for data that could be used to identify a person
a) Protected Information (PI)
b) Personable Identifiable Information (PII)
C) Restricted Information (CI)
Personable Identifiable Information (PII)
Common technology uses a puzzle or game to prove that you are human
a) Certificate
b) Password
c) CAPTCHA
CAPTCHA
This type of currency has enabled hacking to become very profitable
Bitcoin or crypto currency
This type of attack happens due to vulnerabilities, or flaws in a vendor's products or processes:
a) Outside Intrusion
b) Supply Chain Attack
c) Manufacturer Exploit
Supply Chain Attack
The term for an update, fix, or improvement to an existing software application that prevents a vulnerability from being exploited:
a) Plug
b) Plat
c) Patch
Patch
What hackers are most interested in about you:
a) Social Media Accounts
b) Work Credentials (Username and Password)
c) Health Information
Work Credentials (Username and Password)
This cybersecurity company recently caused the biggest global outage in history
a) Cisco Systems
b) Crowdstrike
c) ZScaler
Crowdstrike
This attack is used to shutdown a website by bombarding it with massive amounts of requests:
a) Distributed Denial of Service (DDoS)
b) Shut It Down (SID)
c) You Are Blocked (YAB)
DDoS, DoS, or (Distributed) Denial of Service