Threats
Attacks
Security Devices
Encryption
MSC not IT
100

A malicious program that spreads without user action

What is a worm?

100

Tricking users into giving personal info

What is phishing?

100

Device that filters traffic based on rules

What is a firewall?

100

Scrambling data to protect it

What is encryption?

100

What is the official national animal of Scotland?

Unicorn

200

Software disguised as legitimate but harmful

What is a trojan?

200

Guessing passwords rapidly using automation

 What is a brute force attack?

200

System that detects suspicious activity

What is an IDS (Intrusion Detection System)?

200

Encryption using one shared key

What is symmetric encryption?

200

What is the only letter that does not appear in any U.S. state name?

 Q

300

Attack that floods a system with traffic

What is a DoS (Denial of Service)?

300

Fake website that looks real to steal data

What is spoofing?

300

System that blocks threats automatically

What is an IPS (Intrusion Prevention System)?

300

Encryption using public and private keys

What is asymmetric encryption?

300

What’s the name of the fear of long words?

Hippopotomonstrosesquipedaliophobia

400

Large-scale DoS using many devices

What is a DDoS attack?

400

Attack that tricks DNS into sending users to fake sites

What is DNS poisoning?

400

Device that filters web content

What is a proxy server?

400

Protocol used for secure web browsing

What is HTTPS?

400

What was the first object ever sold on eBay?

A broken laser pointer

500

A network of infected computers controlled remotely

What is a botnet?

500

Capturing data packets traveling across a network

What is packet sniffing?

500

Tool that monitors and logs network activity

What is a SIEM system?

500

Plan for restoring systems after failure

What is a disaster recovery plan?

500

What’s the only food that never spoils?

Honey