Cybersecurity Concepts
Cyber Threats
Social Engineering
Cybersecurity Tools
Cyber Attacks and Defense
100

What is the term for protecting data, devices, and networks from threats?

Cybersecurity

100

What is the term for software designed to harm a computer?

Malware

100

What type of attack involves urgent, fear-inducing messages?

Phishing

100

What security measure encrypts data sent over the internet?

VPN

100

What do you call a malicious program disguised as legitimate software?

Trojan

200

What is a digital space where data is communicated over computer networks?

Cyberspace

200

What kind of attack involves tricking users into revealing sensitive information?

Phishing

200

What do you call a technique that uses fear to manipulate victims?

Scareware

200

What do you call a password-protected access method?

2FA

200

What type of malware replicates itself to spread to other computers?

Worm

300

What principle ensures that data is only accessible by authorized individuals?

Confidentiality

300

What type of malware encrypts your data for ransom?

Ransomware

300

What is the term for pretending to be someone else online?

Impersonation

300

What is a common tool to prevent unauthorized access to networks?

Firewall

300

What is the process of converting data into unreadable code?

Encryption

400

What principle ensures that data is accessible when needed?

Availability

400

What type of malware records keystrokes?

Spyware

400

What type of social engineering involves making false promises?

Baiting

400

What is a digital tool for managing passwords securely?

Password Manager

400

What is a method for attackers to deny users access to information?  

Denial-of-service (DoS)

500

What principle ensures that data has not been altered or tampered with

Integrity

500

What is the term for unauthorized mining of cryptocurrency?

Cryptojacking

500

What kind of attack uses fake URLs to deceive users?

Pharming

500

What is a method for securing email communication?

Pretty Good Privacy (PGP)

500

What method involves attackers hijacking a session between two parties?

Session Hijacking