If using a windows-based PC, you do this to quickly lock your computer before stepping away
Windows key and the letter L
Restaurant slogan is "eat fresh"
Subway
Who has the most tennis wimbledon titles?
What is earth's largest ocean by surface size?
Pacific
A hacker that tries to break into a system to identify the weakness
White hat/ethical hacker
Name the country that has the most reported computer infections from virus attacks.
China
Hershey was founded in which US state?
Pennsylvania
Who founded the game of basketball?
James Naismith
What is the smallest state in the US?
Rhode Island
What does CIA (for cybersecurity) stand for?
Confidentiality, integrity and availability
Any combination of your name, your home address or phone number, credit card or account numbers or social security number.
PII (personally identifiable information)
Which South American country is the world's largest producer of coffee?
Brazil
How long is a football end zone?
10 yards
What is the longest river in the world?
Nile
The list of computers, laptops, software, and equipment by an organization is called?
Inventory
Majid uses several fake e-mails and social engineering to trick Marcelo into giving him his personal information. This is an example of?
Spear phishing
What type of pasta is commonly known as bow-tie pasta?
Farfalle
Which NFL team is publicly owned?
Green Bay Packers
Which country has the most volcanoes?
Indonesia
Watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device.
Shoulder surfing
Beware of these types of programs that track every stroke you make while typing in an effort to glean your password
Keylogging
Which vegetable has the highest water content of any other vegetables?
Cucumber
In what year were the first Air Jordan sneakers released?
1984
How many US states border the Gulf of Mexico?
5 - Florida, Alabama, Mississippi, Louisiana and Texas
They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.
State sponsored hacking