Cyber Security Facts

Types of Cyber Attacks

Preventive Measures
100

What is the weakest link in cybersecurity? 

People inside the organization

100

What is the most common type of cyberattack that targets employees?

[A] Phone Call [B] Snail Mail [C] Phishing [D] Dog

[C] Phishing

100

Protecting data by transforming it into a secure format that can only be read with a key is called what?

Encryption

200

On an average, how long does it takes for an unprotected computer to be compromised once it is connected to the Internet: 

[A] 20 minutes [B] 1 week [C] 10 hours [D] 12 months

[A] 20 minutes?

200

When attackers send fraudulent emails to trick recipients into revealing sensitive information or clicking on malicious links it is called?

[A] Email [B] Sniffing [C] Key Logging [D] Phishing [E] Paper Jam

[D] Phishing

200

What is patch management?

Applying updates to software to fix vulnerabilities.

300

Which of the following devices could potentially be exploited by an attacker? (select all that apply)

A) Desktop computer  

B) Laptop computer

C) Cell phone

D) Television

E) Toaster


Answer: All of them. Yes, even the toaster if it has WiFi

300

Malicious programs that extort money from their victims by blocking access to the computer or encrypting the data stored on it until the victim pays.

 [A] Virus [B] Ransomware [C] Phishing [D] D DOS [E] ATM

[B] Ransomware

300

Name a type of testing measure used to assess cyber vulnerabilities.

Penetration testing

400

What acronym is used to describe everyday objects that are connected to the internet and are able to collect and transfer data automatically? 

[A] UPS [B] ISP [C] IoT [D] VPN [E] BAD

[C] IoT (Internet of Things)

400

Which of these terms is NOT a type of cyber phishing 

[A] Smishing [B] Wishing [C] Quishing [D] Vishing

[B] Wishing

400

This authentication method is the best way to restrict access to your files and devices? 

Multi-Factor/Two-Factor

500

What is the average cost of a data breach in the U.S. Public Sector organizations? 

[A] $100 Thousand [B] $480 Thousand [C] $2.3 Million [D] $20 and a Costco membership [E] $15 Million

500

Social ______ is the name of the cybersecurity threat where actors gather information about a person from online sources to trick others into revealing sensitive information.

Engineering

500

What is a honeypot in cyber security?

A decoy file/server used to attract attackers and alert IT staff of a threat.