Cyber Terminology
Cyber World
Cyber Threats and Vulnerabilities
Cyber Malware
Cybersecurity
100

Which of these terms is NOT a type of cyber phishing [A] Smishing, [B] Wishing [C] Quishing [D] Vishing

What is: [B] Wishing

100

In 2015, over 25 gigabytes of user data was famously leaked by a group self-named "The Impact Team", exposing people seeking extramarital affairs on which two-word Canadian dating network? [A] Ashley Madison [B] Ainsley Madeleine [C] Anna Marie [D] Abby Morgan

What is: [A] Ashley Madison?

100

What is considered a “threat” in cybersecurity? [A] A program that allows your computer to connect to remote apps and desktops [B] Any factor that could potentially harm data and systems [C] Unwanted notifications in web browsers

What is: [B] Any factor that could potentially harm data and systems.

100
A type of Malware, that delivers those pesky pop-ups of some products and similar stuff: [A] Popware [B] Freeware [C] Adware [D] Cookware
What is: [A] Adware?
100

What is the weakest link in cybersecurity? [A] Weak encryption [B] People inside the organization [C] Short passwords [D] Lack of Anti-Virus software

What is: [B] People inside the organization?

200

Malicious programs that extort money from their victims by blocking access to the computer or encrypting the data stored on it until the victim pays. [A] Ransomware [B] Cryptominer [C] Cryptopunk [D] Locker

What is: [A] Ransomeware?

200

If a friendly horse offers you something online that turns out to be malware, that's a cyberattack named for a siege on what ancient city? [A] Troy [B] Paris [C] Sydney [D] Berlin

What is: [A] Troy?

200

What does "vulnerability" mean in cybersecurity? [A] A system that encourages users to create strong passwords [B] Being honest about your feelings with your computer [C] Any IT-related flaw or weakness that can be exploited

What is: [C] Any IT-related flaw or weakness that can be exploited

200
A type of Malware, that disguises itself as a normal program to trick users into downloading and installing malware: [A] Ebola [B] Trojan [C] Bug [D] Bot
What is: [B] Trojan?
200

What’s the best way to secure a weak password like “monkey123”? [A] Add an uppercase numeral and a special character, such as $ [B] Don’t reuse it anywhere else or share it with anyone [C] Enable two-factor authentication [D] Reset the password weekly

What is: [C] Enable two-factor authentication?

300

In the context of password generation, for what does the acronym OTP stand? [A] Over the Password [B] One Touch Password [C] One Time Password [D] Operator Training Password

What is: [B] One Time Password?

300

According to an analysis by the UK's National Cyber Security Centre that investigated passwords belonging to hacked accounts worldwide, what is the most common six-letter "word" that is used for passwords that don't require numbers or punctuation? [A] iloveu [B] asdasd [C] qwerty [D] monkey

What is: [C] qwerty?

300

What is the primary goal of an intrusion detection system? [A] To minimize network downtime [B] To limit access [C] To scan for and send alerts about any suspicious activity

What is: [C] To scan for and send alerts about any suspicious activity

300

An attack that is designed to hinder or stop the normal functioning of a website, server, or other network resource. [A] Spoofing [B] DoS Attack [C] POS Attack [D] Hoak

What is: [B]  DoS Attack?

300

Which of the following communication channels are most used in phishing attempts? [A] Email [B] Phone Call  [C] Text message [D] Social Media

What is: [A] Email?

400

What is the term in network security for an attack where a person or program allows themselves to be identified as someone else by falsifying data? [A] Virus [B] Spoof [C] Malware [D] Spam

[B] Spoof

400

What “J” cybersecurity company based out of Denver, CO offers an MFA and user password resets? [A] Juniper [B] JumpSeat [C] JamPro [D] JumpCloud

What is: [D] JumpCloud?

400

What is the first crucial step in incident response? [A] Set off alarm within an organization by initiating a mass email warning campaign [B] Detection and reporting [C] Make all users immediately change their passwords

What is: [C] Zero?

400
Viruses, worms, bots, phishing and the like in context of computers are examples of: [A] Firmware [B] Hardware [C] Malware [D] Spamware
What is: [C] Malware?
400

What are the common goals of criminals behind a cyber attack? [A] To disrupt an organization's operations [B] To spread useful information [C] To install bugs and viruses to infect the computer [D] To steal information from an individual or business

What is: [D] To steal information from an individual or business?

500

Social ______ is the name of the cybersecurity threat where actors trick others into revealing sensitive information. [A] Hacking [B] Engineering [C] Phishing [D] Scamming

[B] Engineering

500

What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016? [A] Facebook [B] LinkedIn [C] Twitter [D] Instagram

What is: [B] LinkedIn?

500

What is the role of Security Information and Event Management (SIEM)? [A] To manage the schedules of security guards and bouncers in the metaverse [B] To provide secure networks at trade events [C] To aggregate and analyze security-related data within organizations

What is: [C] To aggregate and analyze security-related data within organizations

500

Which of the following malware type allows the attacker to access the administrative controls and enables them to do almost anything he wants to do with the infected computer? [1] Rats [2] Worms [3] Rootkits [4] Botnets

What is: [A] RATs 

Explanation: The RAT is an abbreviation of Remote Access Trojans or Remote Administration Tools, which gives the total control of a Device, which means it, can control anything or do anything in the target device remotely. It allows the attacker administrative control just as if they have physical access to your device.

500

Employing a ______ trust strategy means that every user has to be authenticated no matter what. [A] Encrypted [B] MFA [C] Zero [D] Anti

What is: [C] Zero?