Social Engineering
General
Random Facts
Cyberpatriots
Malware
100

The practice of sending emails pretending to be from reputable companies in order to bait individuals into giving up information.

Phishing

100

True or False?

It is okay to use the same password for several accounts.

False

100

This famous character has a dog named Pluto.

Mickey Mouse

100

You should always read this before anything else on the image.

README

100

This type of malware downloads itself onto a device disguised as a legitimate application but is actually malicious.

Trojan Horse

200

The social engineering method in which attackers target high-level people such as presidents, CEOs, celebrities.

Whaling

200

Generally, how long your passwords should be.

10 letters

200

This island is famous for its stone statues resembling human heads.

Easter Island

200

The application you select to see the amount of points you have.

Scoring Report

200

This type of malware replicates with human interaction.

Virus

300

The social engineering method where the attacker baits people into giving up information by using their voice.

Vishing

300

A setting that should be turned on in Windows, which makes all passwords require upper, lower, and special characters.

Password Complexity.

300

Popular tourist attraction in Egypt.

Pyramids

300

You should always turn on this gate that facilitates what data goes into your device.

Firewall

300

Malware is almost always spread by this type of hacker.

Black Hat

400

The social engineering method that is performed through text messages.

Smishing

400

In Windows, the blue user-friendly interface that allows users to manage and adjust settings on a device or system with ease.

Control Panel

400

The Statue of Liberty was a gift from this country.

France

400

The amount of hours you get to compete tomorrow.

4
400

This type of malware replicates without human interaction.

Worm

500

This type of social engineering targets a specific person.

Spear-Phishing

500

This type of network is the most insecure.

Public

500

This desert is the largest hot desert in the world.

Sahara Desert

500

The state where Cyberpatriot finals are hosted.

Maryland
500

This type of malware is installed on a device and proceeds to record all keys that are pressed in an attempt to find passwords.

Keylogger