"P" Soup
I Got You!
WTF
Attacks
200

This is a very common term for a malicious email

Phishing or Phish

200

Term used to describe impersonating another person's identity

a) Cloning

b) Mirroring

c) Spoofing

Spoofing

200

Responding to questions on social media about your likes, history, family, data can be used by cybercriminals to attack you and is called:

a) A Breach

b) Interactive Exposure

c) Social Engineering

Social Engineering

200

This historic attack left many with tears in their eyes

a) WannaCry

b) Diced Onion

c) Blackeye

WannaCry

400

Term for data that could be used to identify a person

a) Protected Information (PI)

b) Personable Identifiable Information (PII)

C) Restricted Information (CI)

Personable Identifiable Information (PII)

400

New technology that uses fingerprints, Iris Scan, or even DNA to verify your identify

a) Genometric Analysis

b) Quantum Computing

c) Biometrics

Biometrics

400

  SURPRISE!

This pizza topping is causing serious debate about whether it should be on a pizza:

a) Olives

b) Spinach

c) Pineapple

Pineapple

400

  SURPRISE!

ChatGPT's estimate of the people in the USA that believe they were abducted by aliens:

a) 10 million

b) 100,000

c) 20,000

10 million

1000

  SURPRISE!

According to the CDC, nearly 40% of adults don't do this enough:

a) Visit family

b) Sleep

c) Read

Sleep

1000

This type of cyberattack will make data and files unreadable unless money is paid to release the data

a) Spyware

b) Ransomware

c) Hijacking

Ransomware

1000

This type of currency has enabled hacking to become very profitable

Bitcoin or crypto currency


1000

This type of attack happens due to vulnerabilities, or flaws in a vendor's products or processes:

a) Outside Intrusion

b) Supply Chain Attack

c) Manufacturer Exploit


Supply Chain Attack

2000

The term for an update, fix, or improvement to an existing software application that prevents a vulnerability from being exploited:

a) Plug

b) Plat

c) Patch

Patch

2000

What hackers are most interested in about you:

a) Social Media Activity

b) Your Identity

c) Health Information

Your Identity

2000

This cybersecurity company recently caused the biggest global outage in history

a) Cisco Systems

b) Crowdstrike

c) ZScaler

Crowdstrike

2000

Term for an exploit that has never been used before?

a) Early Bird

b) Zero-Day

c) Blitz

Zero-Day