A malicious program that spreads without user action
What is a worm?
Tricking users into giving personal info
What is phishing?
Device that filters traffic based on rules
What is a firewall?
Scrambling data to protect it
What is encryption?
What is the official national animal of Scotland?
Unicorn
Software disguised as legitimate but harmful
What is a trojan?
Guessing passwords rapidly using automation
What is a brute force attack?
System that detects suspicious activity
What is an IDS (Intrusion Detection System)?
Encryption using one shared key
What is symmetric encryption?
What is the only letter that does not appear in any U.S. state name?
Q
Attack that floods a system with traffic
What is a DoS (Denial of Service)?
Fake website that looks real to steal data
What is spoofing?
System that blocks threats automatically
What is an IPS (Intrusion Prevention System)?
Encryption using public and private keys
What is asymmetric encryption?
What’s the name of the fear of long words?
Hippopotomonstrosesquipedaliophobia
Large-scale DoS using many devices
What is a DDoS attack?
Attack that tricks DNS into sending users to fake sites
What is DNS poisoning?
Device that filters web content
What is a proxy server?
Protocol used for secure web browsing
What is HTTPS?
What was the first object ever sold on eBay?
A broken laser pointer
A network of infected computers controlled remotely
What is a botnet?
Capturing data packets traveling across a network
What is packet sniffing?
Tool that monitors and logs network activity
What is a SIEM system?
Plan for restoring systems after failure
What is a disaster recovery plan?
What’s the only food that never spoils?
Honey