Environmental Security
Cybersecurity
Political Security
Economic Security
Miscellaneous
100

The president that signed the Paris Agreement

Barak Obama

100

In CIA+, what does the plus sign (+) stand for?

Accountability & Authenticity

100

The popular technique of using titles and images (e.g., thumbnails) moves users into clicking a link

Clickbait

100

The assets that should rank up first in any risk assessment

Critical mission assets

100

The word opposite to vulnerability

Resilience

200

Empire that closed the access to the red sea in the XV century that led to the discover

Ottoman Empire

200

Threat agent (type) capable of extending existing security tools

Journeyman

200

People who post political messages over multiple social media accounts create a more significant effect on social media platforms

Internet political trolls

200

The regulation that Hospitals need to comply with with regards to their patients' privacy

HIPPA

200

The two factors that enable the calculation of risk

Likelihood & Severity

300

The main mineral resource in dispute at Alsace-Lorraine which lead to WWII

Iron

300

The paths and means threat agents execute attacks

Attack Vectors

300

Three mechanisms governments use to censor their citizens

Fear, friction, and flooding

300
Two mechanisms that enable Bitcoin to operate
Encryption & Blockchain
300
The attack that hackers execute to obtain unauthorized access to a database

SQL Injection

400

Russian politician famous for the following phrase "We are facing a global environmental crisis, a conflict between man and nature

Mikhail Gorbachev

400

The organization that was breached through their customer complaint portal

Equifax

400

African country in which the government closed the Internet access to control against a political uprising

Egypt

400

The four methods to manage risk

Avoidance, transfer, mitigation, and acceptance.

400

The attack that requires the hacker to try every available combination of a password

Brute force attack

500

The metric commonly use to measure ecological security

Life expectancy

500

The two models that are commonly used to explain networking layers

TCP & OSI Model.
500

The primary sentiment misinformation attempts to convey over the Internet

Fear

500
Entry security position in organizations

Security analyst

500

The name of the volcano that was used in class to depict global warming

Cotopaxi