Phishing
Beyond Passwords
Social Engineering
Malware
Miscellaneous
100

You receive an urgent message from your bank saying your account has been frozen due to unauthorized access attempts. It says you must reset your password to unlock your funds via an included link. What should you do?

What is Go to the main bank website and log into your account?

100

These should be used in addition to passwords on devices?

What are PINs or passcodes?

100

________is a type of security attack where scammers trick people into giving them access to sensitive information

What is social engineering?

100

Doing this can help prevent malware from infecting your computer.

Updating your web browser.

100

____is the practice and study of techniques for securing information and communication mainly to protect the data from third parties that the data is not intended for.

What is Cryptography?

200

_________ are targeted and deceptive emails sent to you in order to gain information, access, or money. The intent is malicious.

What is phishing emails?

200

_______ are longer passwords composed of multiple, random words

What are Passphrases?

200

A small, focused, targeted attack via email on a particular person or organization with the goal to penetrate their defenses.

What is spear phishing?

200

This type of malware will encrypt your computer and hold data hostage for money

What is Ransomware?

200

_______is used to create a safe and encrypted connection.

What is a VPN or Virtual Private Network?

300

________ is an unsolicited email that attempts to sell you a product or service. It’s mainly a nuisance, but not necessarily harmful.

What is spam?

300

To remember strong passwords, you can do this in order not to forget them

What is use password management software with encryption?

300

The right of individuals to remove their personal data from being stored or used by an organization is called?

What is the Right to be Forgotten?

300

______monitors user activities for marketing purposes or keylogs user credentials

What is Spyware?

300

_______ is the process of finding vulnerabilities on the target. In this case, the organization would have set up all the security measures they could think of and would want to test if there is any other way that their system/network can be hacked.

What is a Penetration test?

400

When ________ successfully obtain user credentials for some systems, they not only gain access to the accounts that use the credentials, but they can potentially access high-value organizational data.

What are phishers?

400

An extra layer of security is known as

What is multi-factor authentication?

400

Social engineers will do this before contacting an employee. It’s done through social media, websites, and other resources.

What is Research?

400

_____act as traffic cops for network activity and block anything suspicious.

What are Firewalls and intrusion detection systems?

400

 Encrypted data can be converted back to original data by the process of decryption but  _____data cannot be converted back to original data.

What is Hashed data?

500

___(fake SMS/texts) messages entice, trick, and scare users into clicking

What is smishing?

500

______ is a way of finding out the right credentials by repetitively trying all the permutations and combinations of possible credentials.

What is a Brute Force attack?

500

A method used by social engineers to gain access to a building or other protected area.

What is Tailgating?

500

_____ is a type of cyberattack where a malicious actor inserts themselves into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other.

What is a man-in-the-middle attack?

500

CIA stands for ________ and is a model that is designed to guide policies for Information Security. It is one of the most popular models used by organizations.

What is Confidentiality, Integrity, and Availability?