This is a very common term for a malicious email
Phishing or Phish
Term used to describe impersonating another person's identity
a) Cloning
b) Mirroring
c) Spoofing
Spoofing
Responding to questions on social media about your likes, history, family, data can be used by cybercriminals to attack you and is called:
a) A Breach
b) Interactive Exposure
c) Social Engineering
Social Engineering
This historic attack left many with tears in their eyes
a) WannaCry
b) Diced Onion
c) Blackeye
WannaCry
Term for data that could be used to identify a person
a) Protected Information (PI)
b) Personable Identifiable Information (PII)
C) Restricted Information (CI)
Personable Identifiable Information (PII)
New technology that uses fingerprints, Iris Scan, or even DNA to verify your identify
a) Genometric Analysis
b) Quantum Computing
c) Biometrics
Biometrics
SURPRISE!
This pizza topping is causing serious debate about whether it should be on a pizza:
a) Olives
b) Spinach
c) Pineapple
Pineapple
SURPRISE!
ChatGPT's estimate of the people in the USA that believe they were abducted by aliens:
a) 10 million
b) 100,000
c) 20,000
10 million
SURPRISE!
According to the CDC, nearly 40% of adults don't do this enough:
a) Visit family
b) Sleep
c) Read
Sleep
This type of cyberattack will make data and files unreadable unless money is paid to release the data
a) Spyware
b) Ransomware
c) Hijacking
Ransomware
This type of currency has enabled hacking to become very profitable
Bitcoin or crypto currency
This type of attack happens due to vulnerabilities, or flaws in a vendor's products or processes:
a) Outside Intrusion
b) Supply Chain Attack
c) Manufacturer Exploit
Supply Chain Attack
The term for an update, fix, or improvement to an existing software application that prevents a vulnerability from being exploited:
a) Plug
b) Plat
c) Patch
Patch
What hackers are most interested in about you:
a) Social Media Activity
b) Your Identity
c) Health Information
Your Identity
This cybersecurity company recently caused the biggest global outage in history
a) Cisco Systems
b) Crowdstrike
c) ZScaler
Crowdstrike
Term for an exploit that has never been used before?
a) Early Bird
b) Zero-Day
c) Blitz
Zero-Day