2.1 - What is Cybersecurity?
2.2 - C.I.A Triad
2.3 - Security/Password Simulations
2.4 - Hacking Ethics
2.5 - Web Tracking
100

What does the term "cybersecurity" refer to?

What is "Protection of systems and data from digital attacks"

100

What does the CIA Triad stand for in cybersecurity?

Confidentiality, Integrity, Availability

100

What is phising?

A method of gathering personal information using deceptive emails and websites

100

Which type of hacker is considered a criminal and faces legal consequences?

Black Hat

100

What is the purpose of a data broker?

To collect, process, and sell personal data

200

What is the Internet of Things? (IoT)

A network of devices that connect and exchange data

200

Which part of the CIA Triad is violated when unauthorized users can view private information?

Confidentiality

200

Why should you be cautious with privacy policies?

Some use your data to target ads or make money

200

What makes Grey Hat Hacking unethical or illegal?

It is done without permission

200

Which of the following companies is not typically involved in web tracking? 

  • Google
  • Meta (Facebook, Intsta, WhatsApp)
  • Amazon
  • National Park Service

The National Park Service

300

Why is cybersecurity important?

It protects personal information stored and shared on computers

300

What does the 'Integrity' component of the CIA Triad protect against?

Unauthorized or accidental changes to data

300

What does the "s" in "https://" indicate?

The site is secure

300

What is a bug bounty program?  

A reward for finding and reporting security vulnerabilities  

300

What is a method to create a unique profile based on your device and settings 

What is browser fingerprinting

400

Which of the following is a risk associated with IoT devices?

They can be hacked to tamper with critical systems like airplanes and pacemakers

400

What scenario represents a failure in 'Availability'?

A website crashes before a user can access their grades

400

What is the purpose of two-factor authentication?

To add an extra layer of security

400

What is penetration testing?

A simulated cyberattack where ethical hacking takes place to find vulnerabilities in a companies security

400

What is a clear image used to track user behavior 

What is a "pixel tracker"

500

What was the impact of the 2017 Equifax data breach?

It exposed the personal information of 145.5 million people

500

Which of the following is a concern related to confidentiality?

Wiretapping, Dumpster Diving, snooping,etc

500

What is a strong password practice?

Using a mix of uppercase, lowercase, numbers, and special charactersUsing a mix of uppercase, lowercase, numbers, and special characters

500

What is "hacking to promote a political or social cause"

 

What is hactivism

500

What is the difference between a first party cookie and a third party cookie?

A first party is from a site that you have visited while a third party is from a site you have not visited before.