This is the name of someone that breaks into computers, and applications
Hacker
False claims of romance, tech support offers, lottery plays, grandparents, shopping sites/cards are all considered to be:
a) Profiling
b) Cyber Intelligence
c) Scams
Scams
This is a security gap or flaw that can be exploited:
a) Gateway
b) Vulnerability
c) Break
Vulnerability
This is commonly used to secure remote and mobile communications:
a) Virtual Private Network (VPN)
b) Nailed-up Connection
c) Block Chain
Virtual Private Network or VPN
This is the name for a coworker that discloses confidential information:
a) Insider
b) Mole
c) Eyes
Insider
Term for AI generated image or voice of a person used to trick people into believing they are real for threats and intimidation:
a) Deep Fake
b) Big Fraud
c) Dup(licate)
Deep Fake
Approximate percentage of cybersecurity incidents that could be easily avoided:
a) 10%
b) 40%
C) 80%
80%
This common security product is used to block unwanted and malicious network traffic
a) Blocker
b) Guardian
c) Firewall
Firewall
This is the name of the location where cyber criminals can buy, sell, and share illegal or stolen data with little fear of being caught
Dark Web
SURPRISE!
Is it traditionally considered bad luck to wear "white" after this holiday in the USA:
a) 4th of July
b) Labor Day
c) Halloween
Labor Day
This is continually the most cyber-attacked industry:
a) Healthcare
b) Government / Public
c) Manufacturing
Healthcare
This technology renders data unreadable unless a key is used to make it readable
Encryption
Name of hacker group that uses this image of an historic person: a) Zoro b) Gladiator c) Anonymous
Anonymous
When a person uses false information to create a fake identity, online accounts, images, etc. in order to scam or harass others:
a) Deep Fake
b) Catfishing
c) Espionage
Catfishing
Most common password used globally - and it's very bad
a) 123456
b) qwerty
c) abcdef
123456
SURPRISE!
This is still the Number 1 selling album of all time with 47 million sold
Thriller