Cyber Threats
Best Practices
Cybersecurity Roles
Historical Events
Fun Facts
100

What is malware?

Malicious software designed to damage, disrupt, or gain unauthorized access to a system.


100

Why use strong passwords?

To prevent attackers from guessing or cracking your login using brute-force or dictionary attacks.

100

Role of a security analyst?

Monitors systems for security breaches, investigates incidents, and implements protections.

100

First computer virus?

Creeper virus (1971), spread via ARPANET.

100

What is "cyber hygiene"?

Regular habits and practices that ensure safe and secure use of technology.


200

Define phishing.


A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity, usually via email.




200

What is two-factor authentication?

A login method that uses two different types of verification: something you know (password) and something you have (phone or token).

200

What does a penetration tester do?

Ethically hacks into systems to find and fix vulnerabilities before real hackers exploit them.

200

What was the Morris Worm?

One of the first worms on the internet (1988), it caused widespread disruption unintentionally.

200

Meaning of "white hat" hacker?

A good hacker who uses their skills to protect systems and find security flaws.

300

Name a type of ransomware.

WannaCry (Other valid answers: Petya, Locky, Ryuk)

300

Importance of software updates?

They patch security flaws, fix bugs, and improve defenses against new threats.

300

Define ethical hacker.

A cybersecurity expert who legally breaks into systems to improve their security.

300

Significance of the Target data breach?

In 2013, 40 million credit cards were stolen due to a third-party vendor’s compromise.

300

Define "pharming."

Redirecting users from a real website to a fake one to steal information.

400

What is a DDoS attack?

A Distributed Denial of Service attack overwhelms a server or network with traffic to make it unavailable.

400

Define VPN.

 A Virtual Private Network encrypts your internet connection and hides your IP address for privacy.

400

What is a CISO?

Chief Information Security Officer—an executive responsible for a company’s information security.

400

What happened during the WannaCry attack?

In 2017, ransomware infected over 200,000 computers in 150 countries, exploiting a Windows flaw.

400

What is "spear phishing"?

A targeted phishing attack aimed at specific individuals or organizations.


500

xplain a zero-day exploit.

A cyberattack that targets a software vulnerability unknown to the vendor, with no patch available yet.

500

What is encryption?

The process of converting data into unreadable code to prevent unauthorized access.

500

Responsibilities of a network administrator?

Manages, configures, and secures network infrastructure, ensuring smooth and safe data flow.

500

Impact of the SolarWinds hack?

A major supply chain attack in 2020 that compromised U.S. government agencies and private companies.

500

Explain "zero trust" security model.

A model where no user or device is trusted by default—verification is required at all times.