Cyber Awareness
Networking
Malware/hacking
Computing
Pro-Tech (x2 points)
100

This type of incident can cause businesses to lose reputation and money. It results from the secret data of its clients being leaked. 

What is a data breach?

100

This is used by electronic devices to wirelessly connect to the network. 

What is WiFi?

100

This computer program spreads or self-replicates and may damage the system and steal user information.

What is a worm?

100

This is used by computers to communicate between the hardware and the applications. Windows, Mac, Linux, and iOS are examples of this. 

What is an operating system (OS)?

100

These two numbers are used to represent the binary information in the computer. 

What are 0 and 1?

200

You receive an email urging you to click a link to renew your bank account password. You should first check the link by hovering over it, in order to prevent this type of attack. 

What is a phishing attack?

200

This keyword at the beginning of any URL should be checked, indicating that it is encrypted and protected with an SSL certificate. 

What is "https://" ?
200

It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is designed to give hackers access to your computer or files.

What is a Trojan Horse?

200
This should be done occasionally or periodically to ensure that, in case the system becomes corrupt, one can restore the system to a healthy state. 

What is a backup?

200

A malfunction of this piece of hardware inside a computer could result in an incorrect time/date. 

What is a CMOS battery?

300

You were emailed by someone recruiting for a remote part-time research assistant job for your university professor. Soon after you accept, the professor instructs you via text message to deposit a check and then submit an online bank transfer to pay for supplies.

This should be suspected of being a _______. 

What is a scam?

300

Every host possesses this information on a network, composed of 4 bytes, used to address packets to and from each host. 

What is an IP address? (More specifically Ipv4 address)

300

This type of hacking tactic is the MOST COMMON and vulnerable, utilized by hackers for malicious intent. 

What is social engineering (phishing)?

300

This is a common key combination to terminate an application task or to reboot the OS. It is also helpful to forcefully quit when the usual shutdown options don't work. 

What is Ctrl+Alt+Del?

300

This protocol establishes communication over a network, after a three-way handshake. 

What is Transmission Control Protocol (TCP)?

400

This policy is a set of rules applied by the owner, creator, or administrator of a computer service or network. It is often enforced when employees use their company devices. 

What is acceptable use policy (AUP)?
400

This usually protects your private network at home from cyberattacks and serves as the default gateway of your private network. It is often directly connected to the modem or combined with the modem. 

What is a router?

400

This type of malware is designed to prevent access to a system until a sum of money is paid.


What is Ransomware?



400

This piece of hardware is the main "brain" of the computer. An example of this is the Intel Core i9-13900K. 

What is a Central Processing Unit (CPU)?

400

These are the two port numbers used for Hypertext Transfer Protocol (with and without an SSL certificate).

What are TCP ports 80 and 443?

500

This is the students' right that enables access to their education records and control over the disclosure of personally identifiable information from the education records. Students often sign a waiver of this during the college application season, to waive their right to view their Letter of Recommendation. 

What are Family Education RIghts and Privacy Act (FERPA) rights?

500

This cable is commonly used in local area networking to transfer data. 

What is an ethernet cable? (Many alternatives: coaxial cable, twisted pair cable, etc.)

500

This type of cipher involves shifting each letter a certain number of spaces down the alphabet.

What is the Caeser Cipher?

500

This critical error screen, colored blue, appears in Windows during a fatal system error, such as hardware failure. 

What is the blue screen of death (BSOD)?

500

This type of address has the value 127.0.0.1. It is often used to confirm that the host has the ability to send and receive packets. 

What is the loopback address?