CIA & Auth
Social Engineering
Malware Madness
Next-Gen Tech
AI & Computing
100

Preventing unauthorized access to data, such as using encryption, falls under this part of the CIA Triad.

What is Confidentiality?

100

Sending fraudulent emails that appear to come from a legitimate source to steal data.

What is Phishing?

100

Software designed specifically to disrupt, damage, or gain unauthorized access to a system.

What is Malware?

100

Physical objects embedded with sensors and software that connect and exchange data over the internet.

What is the Internet of Things (IoT)?

100

The capability of a computer system to perform tasks typically associated with human intelligence, like reasoning.

What is Artificial Intelligence?

200

A DDoS (Distributed Denial of Service) attack that crashes a website primarily violates this CIA principle.

What is Availability?

200

Looking over someone's shoulder to see them type their password or PIN.

What is Shoulder Surfing?

200

A specific type of malware that encrypts your files and demands payment to restore access.

What is Ransomware?

200

This technology creates a fully immersive digital environment, completely shutting out the physical world.

What is Virtual Reality (VR)?

200

The field of AI that enables computers to interpret and understand visual information.

What is Computer Vision?

300

Entering a PIN or Password is an example of this type of authentication. Something you ____.

What is Something you know?

300

Searching through trash to find confidential information, like bills or notes.

What is Dumpster Diving?

300

This type of malware disguises itself as a legitimate program (like a game) but contains malicious code.

What is a Trojan?

300

Delivering computing services (servers, storage, databases) over the internet on a pay-as-you-go basis.

What is Cloud Computing?

300

A system trained on vast amounts of text to understand and generate human language (like GPT).

What is a Large Language Model (LLM)?

400

Using a fingerprint scanner or FaceID is an example of this authentication factor. Something you ____.

What is Something you are?

400

Following an authorized person through a secure door without providing your own credentials.

What is Piggybacking?

400

Malware that self-replicates and spreads across a network without needing a host file.

What is a Worm?

400

A decentralized, public ledger of transactions shared across a peer-to-peer network.

What is Blockchain?

400

Which type of attack involves rapidly testing all possible combinations of characters to guess a password?

What is a Brute Force attack?

500

Which element of the CIA Triad ensures that data is not modified or tampered with by unauthorized people?

What is Integrity?

500

A social engineering attack conducted specifically over the phone (voice).

What is Vishing?

500

Software that secretly collects user data (like browsing history) without their consent.

What is Spyware?

500

Processing data closer to where it is created (like on a smart thermostat) rather than sending it all to a central server.

What is Edge Computing?

500

A type of computing that uses "qubits" and can represent both 0 and 1 at the same time.

What is Quantum Computing?