What does the “S” stand for in HTTPS?
A) Secure
B) Server
C) Session
D) Script
A) Secure
Q: What kind of attack tricks you into giving up personal info?
A. Phishing
B. Spoofing
C. Sniffing
D. Spamming
A. Phishing
Q: What does AI stand for?
A. Automated Interface
B. Artificial Intelligence
C. Advanced Internet
D. Auto Input
B. Artificial Intelligence
Q: What kind of password is best?
A. Your birthday
B. Short and simple
C. Long and complex
D. Your pet’s name
C. Long and complex
Q: Should you let someone follow you into a secure area?
A. Yes, if they smile
B. Only if they look official
C. No
D. Always
C. No
What does the “S” in HTTPS stand for?
A. A type of firewall
B. A secure software
C. Software designed to harm systems
D. A password manager
C. Software designed to harm systems
Q: What’s a common sign of a phishing email?
A. Personalized greeting
B. No links
C. Urgent tone and suspicious links
D. Sent from your boss
C. Urgent tone and suspicious links
Q: What is a deepfake video?
A. A secure video
B. A fake video made with AI
C. A type of malware
D. A phishing email
B. A fake video made with AI
Q: What helps you manage strong passwords?
A. Sticky notes
B. Password manager
C. Email
D. Antivirus
B. Password manager
Q: What should you do with a found USB drive?
A. Plug it in
B. Give it to a coworker
C. Report it to IT
D. Use it for backups
C. Report it to IT
What principle limits access to only what is needed?
A. Full Access
B. Least Privilege
C. Zero Trust
D. Open Policy
B. Least Privilege
What is spear phishing?
A. Random spam
B. Targeted phishing attack
C. Phishing via phone
D. Malware disguised as email
B. Targeted phishing attack
Q: Why are deepfakes a cybersecurity concern?
A. They’re fun to watch
B. They can impersonate people
C. They slow down the internet
D. They’re easy to detect
B. They can impersonate people
Q: What is multi-factor authentication (MFA)?
A. Using one password
B. Using a backup email
C. Using multiple ways to verify identity
D. Changing passwords monthly
C. Using multiple ways to verify identity
Q: What’s it called when you lock your screen before leaving?
A. Screen timeout
B. Screen locking
C. Auto logout
D. Power saving
B. Screen locking
What’s the difference between a vulnerability and a threat?
A. They’re the same
B. A threat is a weakness; a vulnerability is an attack
C. A vulnerability is a weakness; a threat exploits it
D. A threat is always internal
C. A vulnerability is a weakness; a threat exploits it
Q: What’s the difference between phishing and smishing?
A. Phishing is fake websites; smishing is fake apps
B. Phishing uses email; smishing uses text
C. Smishing is more dangerous
D. Phishing is legal
B. Phishing uses email; smishing uses text
Q: How can you spot a deepfake?
A. Perfect lighting
B. Unnatural blinking or mismatched audio
C. High resolution
D. Fast loading
B. Unnatural blinking or mismatched audio
Q: What is a passphrase?
A. A short password
B. A phrase that’s easy to guess
C. A long, memorable phrase
D. A code sent to your phone
C. A long, memorable phrase
Q: What is a clean desk policy?
A. Keeping your desk tidy
B. No food at your desk
C. Securing sensitive info when not in use
D. Using only digital notes
C. Securing sensitive info when not in use
Q: What framework includes Identify, Protect, Detect, Respond, and Recover?
A. ISO 27001
B. NIST Cybersecurity Framework
C. OWASP Top 10
D. MITRE ATT&CK
B. NIST Cybersecurity Framework
Q: What is a “watering hole” attack?
A. A fake login page
B. A phishing site
C. Compromising a trusted website
D. A fake social media profile
C. Compromising a trusted website ✅C) 1969
Q: What’s it called when AI mimics writing style for phishing?
A. Smart phishing
B. AI spoofing
C. Adversarial AI
D. Neural hacking
C. Adversarial AI
Q: What is credential stuffing?
A. Guessing passwords
B. Using stolen credentials on multiple sites
C. Filling out forms
D. Encrypting passwords
B. Using stolen credentials on multiple sites
Q: What is “juice jacking”?
A. Charging your phone too fast
B. Using public Wi-Fi
C. Malware via public charging ports
D. Overheating your device
C. Malware via public charging ports