Identify
Protect
Detect
Respond
Recover
100

Malicious software (malware) that encrypts or locks you out of your computer, device, or files until a ransom is paid

What is ransomware?

100

Date of birth, phone number, SSN, credit card number, or password

What are things a bad actor wants to steal

100

Email, text message, phone, social media, and Email

What are the five most common ways people get phished

100

Attempts to trick a user into sharing personal or sensitive information

What is Phishing?

100

What “M” computer security company, founded by namesake John in 1987 before being acquired by Intel in 2011, is well known for its anti-virus software that is available to individual consumers?

What is McAfee?

200

Through what mechanism do phishing attempts come through?

What is email 

200

Three social media sites often experience phishing scams

What is Facebook, Instagram, and Snapchat?

200

Although cartoon bears might like it, a hacker might not enjoy being tricked into hacking what sweet-sounding, eight-letter decoy computer system that's purposely made to attract attackers to gain insight into how to decrease cybersecurity threats?

What is Honeypot?

200

It sounds like something a hacking hound would do, but which term describes watching for and catching data packets passing through a network’s traffic?

What is Sniffing?

200

This type of data or information is often captured by hackers during a ransomware attack

What are confidential files?

300

This is the process of encoding information in a way so that only someone with a key can decode it

What is encryption?

300

Information including your name, home address, phone number, gender, social security number, etc.

What is personal information?

300

Things you should not do if you are suspicious of an email

What is click a link or attachment?

300

Massimiliano Montoro developed a password cracking tool for Windows that was named after what biblical pair of brothers with a notable, fatal head-cracking in their story?

What is Cain and Able?

300

If you receive a phishing email you should

What is report it in Outlook using the "Phish Alert Report" button?

400

Suspicious sender email addresses, requests for personal information, urgent language, and spelling or grammatical errors

What are Sign to look out for in phishing emails

400

When walking away from my device, I should ...?

What is clear and close my screen

400

A phishing technique used by attackers named similarly to a popular MTV show

What is Catfish?

400

The term used for the moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network

What is a breach?

400

In 2011, this large video game network was hacked, exposing 77 million accounts.  Estimated losses were $171 million while the site was down for a month

What is Sony's Playstation Network?

500

A type of phishing that targets specific individuals or organizations in a business

What is spear phishing?

500

A piece of malware that often allows a hacker to gain remote access to a computer through a "back door"

What is a trojan horse?

500

What term is used for a testing environment in a computer system in which new or untested software or coding can be run securely? In a different context, this term refers to a children’s play area.

What is a Sandbox?

500

What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016?

What is LinkedIn?

500

When an attacker calls a phone number and creates a heightened sense of urgency that makes the victim take actions against their best interests

What is Vishing?