Cybersecurity Basics
Cyber Insurance & Risk
Crypto & Blockchain
AI & Machine Learning
Threats, Hacks & Shenanigans
100

What security control grants people access to systems based on their permissions? Usually this involves more than one method?

Authentication (Multi-Factor)

100

What is the section of the policy that stipulates how parties must act and rules they must follow in the event of a claim?

Conditions

100

What is the digital ledger technology that keeps track of transactions without needing a middleman?

Blockchain

100

What do we call the data used to teach an AI model—basically the “childhood experiences” of the algorithm?

Training Data

100

What’s the attack where someone tries to trick you into clicking a malicious link—often claiming you won a prize you absolutely did not win?

Phishing

200

What is the term for disguising / obfuscating data into randomized alphanumerical strings so that even your nosy coworker Brad can’t read it?

A: Encryption

200

What is the term for claims that trigger the Privacy Liability insuring agreement that do not stem from bad guys in the system?

Wrongful Collection / Non Breach Privacy

200

What is the basis of the cryptography that jumbles up readable language and/or secrets into alphanumeric mumbo-jumbo? This is a one-way function that transforms data of any size into a fixed-length, unique digital fingerprint.

Hashing algorithms

200

What’s the term for when an AI confidently gives you the wrong answer?

Hallucination

200

Ransomware typically encrypts data until a ransom is paid. What is the term for the key that restores the files?

Decryption Key
300

When a company forces you to change your password every 90 days, what security principle are they trying (and failing emotionally) to enforce?

Password hygiene / credential rotation

300

What is the coverage that reimburses the insured for issues involving their physical vendor supply chain?

Non-IT Business Interruption

300

What is the term for a crypto coin’s “digital wallet hash” that you should definitely never store in a sticky note on your monitor?

Private Key

300

What is the term for specialized AI tools that perform specific tasks?

Agents

300

When hackers exploit an unknown vulnerability—no patch, no warning—it’s called what?

Zero Day

400

What is the name of the software that monitors user behavior on corporate machines to ensure bad actors are not in the network?

EDR (Endpoint Detection and Response)

400

Which insuring agreement refers to a compliance framework with 4 levels based on merchant transaction volume?

PCI-DSS

400

Who is the alleged inventor of the Bitcoin protocol?

Satoshi Nakamoto

400

What are the data units—characters, words, or parts of words—used to break down information for neural networks. 

Tokens

400

What’s the type of attack where huge amounts of traffic overwhelm a website? 

DDoS

500

What is the term for endpoint protection that expands beyond just the corporate firewall to the cloud, mobile devices, and servers?

XDR (Extended Detection and Response)

500

What is the term for a Business Interruption Waiting period that provides reimbursement coverage back to hour zero for a covered claim payment?

Qualifying Period

500

What’s the name of the crypto mechanism where computers compete to solve puzzles for block rewards?

Proof of Work

500

What is the underlying technology of AI representing computational models inspired by the human brain to process data, recognize complex patterns, and make predictions?

Neural Networks

500

Who was the infamous retailer who got breached in 2013 through stolen HVAC contractor credentials?

Target