1. Cyber Basics
2. Phishing & Scams
3. Passwords & Authentication
4. Online Safety at Work
5. Cybersecurity History & Laws
100

This is a general term for a program designed to damage or disrupt computers.

What is malware?

100

This term describes emails that try to trick you into giving up sensitive info

What is phishing?

100

This type of password is the most secure: long, complex, and __________.

What is unique?

100

You should lock your computer when doing this

What is stepping away from your desk?

100

Cybersecurity Awareness Month started in this year

What is 2004?

200

Keeping your software and operating system updated helps protect against these.

What are security vulnerabilities?

200

A red flag of a phishing email is poor spelling, suspicious links, or this.

What is urgent or threatening language?

200

Using the same password on multiple accounts increases this risk.

What is a data breach or compromise?

200

Only use this kind of USB drive or external device

What is one provided or approved by IT?

200

This U.S. agency leads national cybersecurity efforts.

What is CISA (Cybersecurity and Infrastructure Security Agency)?

300

A type of software that guards your system against unauthorized access

What is a firewall?

300

A fake website that looks real and is designed to steal your data

What is a spoofed website?

300

A random group of characters stored in a password manager

What is a generated password?

300

Before clicking on links, you should do this

What is hover over the link or verify the source?

300

The EU's major privacy regulation introduced in 2018

What is GDPR (General Data Protection Regulation)?

400

The process of converting data into a coded form to prevent unauthorized access

What is encryption?

400

Phishing attempts by phone are often called this

What is vishing?

400

2FA stands for this cybersecurity best practice.

What is two-factor authentication?

400

These types of documents are often used to deliver malware

What are attachments (e.g., PDFs, Word documents)?

400

The first known computer worm to spread widely, in 1988

What is the Morris Worm?

500

This term refers to the act of defending computers and networks from digital attacks

What is cybersecurity?

500

SMS-based phishing attacks are referred to as this

What is smishing?

500

A method that sends a temporary code to your phone or email

What is multi-factor authentication (MFA)?

500

Keeping this type of software up to date is a top IT priority

What is antivirus or endpoint protection software?

500

This act makes unauthorized access to computers illegal in the U.S

What is the Computer Fraud and Abuse Act?

600

Public Wi-Fi can be risky because of this potential threat

What is data interception or man-in-the-middle attacks?

600

A phishing attack targeting high-level executives

What is spear phishing or whaling?

600

This type of password attack tries every possible combination

What is a brute-force attack?

600

You should never share your credentials with this group.

What is anyone, even coworkers?

600

This global event in 2017 affected systems in over 150 countries

What is the WannaCry ransomware attack?

700

The three core principles of cybersecurity

confidentiality, integrity, and __________. What is availability?

700

If you receive a suspicious message at work, your first step should be this.

What is report it to IT or your security team?

700

Biometric security uses these types of personal identifiers

What are fingerprints, facial recognition, or retina scans?

700

This regular event helps test an organization’s cyber response.

What is a cybersecurity drill or incident response simulation?

700

This person is credited with founding the field of computer security

Who is Willis Ware?