What is the most common password used?
What is "123456" or "password"?
What is the name of a fake website that mimics a real one to steal your info?
Which operating system was infamously vulnerable to viruses in early 2000s, giving a rise to a golden age of malware?
What is WindowsXP?
What team is used to stimulate real-word attacks on your systems to treat your defenses?
What is red team?
What framework uses the categories to Identify, Protect, Detect, and Respond?
What is NIST Cybersecurity Framework?
What does HTTPS stand for?
What is Hypertext Transfer Protocol?
What is called when attackers use AI generated content or fake videos to impersonate someone?
What is Deepfake?
What is the first major worm to use social engineering by pretending to be a love letter?
ILOVEYOU Virus (2009)
What's the name of the software designed to specifically to detect and remove spyware?
What is anti-spyware?
What regulation is aimed to protect children's online privacy in the U.S.?
What is Children's Online Privacy Protection Act (COPPA)?
What is the minimum recommended number of characters for a strong password?
What is at least 12 characters?
What cyberattack involves inserting malicious code into a SQL query?
What is SQL injection?
What 1995 film starring Angelina Jolie popularized the image of edgy teen hackers in pop culture?
What is Hackers?
What browser extension blocks ads and malicious scripts to protect your browsing experience?
What is AdBlock or uBlock origin?
Which ISO standard focuses on information security management systems?
What is ISO/IEC 27001?
What is CAPTCHA meant to stop?
What is Automated Bots from accessing site or service?
What kind of malware gives an attacker complete control of a victim's system?
What is Remote Access Trojan (RAT)?
What popular retailer's 2013 breach was caused by compromised HVAC vendor credentials?
What is Target?
What tool can sniff network packets and is often used in ethical hacking and network diagnostics?
What is Wireshark?
What global privacy law introduced the "right to be forgotten"?
What is General Data Protection Regulation (GDPR)?
What are the three main types of multi-factor authentication factors?
What is something you know (password), something you have (token), something you are (biometrics)?
What attack method monitors a target's public communications to craft convincing phishing messages?
What is Open-Source Intelligence (OSINT) based social engineering?
What major data leak in 2016 exposed users of a site for people seeking extramarital affairs?
What is Ashley Madison Breach?
What's the term for disguising data in transit to look like something else to avoid detection?
What is Tunneling?
What U.S. regulation requires financial institutions to develop and maintain a written information security plan?
What is Gramm-Leach Bliley Act (GBLA)?