Cyber Basics
Cyber Careers
Name Some!
Cyber Acronyms
WiCyS @ FIU
100

This is the most common method hackers use to trick users into giving up passwords?

What is Phishing?

100

These professionals simulate cyberattacks to find system vulnerabilities.

Who are penetration testers/ethical hackers?

100

Name 3 Types of Phishing

What is....Email phishing, Spear phishing, Whaling, Clone phishing, Angler phishing, Vishing, Smishing, Pharming, Business Email Compromise (BEC), QR code phishing (QRishing), Watering hole attacks, Pop-up phishing, Search-engine phishing, OAuth phishing, Man-in-the-middle phishing, Domain spoofing, Homograph attack, Deepfake phishing, Evil Twin Wi-Fi phishing, Attachment-based phishing...etc

100

What does WiCyS stand for?

Thats too Easy! What is the CIA Triad?

100

This month is officially recognized as Cybersecurity Awareness Month.

What is... October?

200

This process turns readable data into scrambled code to protect it from unauthorized access.

What is encryption?

200

This entry-level IT role often serves as the first point of contact for users experiencing technical issues.

What is a Help Desk Technician?

200

Name 3 Cybersecurity certification Vendors

What is...CompTIA, (ISC)², ISACA, EC-Council, Offensive Security, GIAC (SANS Institute), Cisco, Microsoft, Google, AWS, IBM, Palo Alto Networks, Fortinet, Red Hat, CREST etc...

200

This 3 letter acronym hides your online identity by encrypting your internet traffic through a discrete server.

What is a VPN? (Virtual Private Network)

200

Free if you Brought a Friend!

Didn't bring a friend? Free if you follow WiCyS FIU on at least 2 social media platforms!

300

Regularly updating this helps patch known vulnerabilities.


What is your operating system or software?

300

These analysts monitor systems and respond to cybersecurity incidents in real time.

Who are SOC Analysts?

300

Name 3 commonly used Cybersecurity tools

What is...Wireshark, Nmap, Metasploit, Nessus, Burp Suite, Snort, Splunk, Suricata, Kali Linux, OpenVAS, OSSEC, Aircrack-ng, Autopsy, Nikto, John the Ripper etc...

300

This stands for the unique identifier assigned to every device on a network.

What is IP (Internet Protocol)?

300

Name 2 WiCyS FIU Eboard Members!

Who is....

400

This layer of security monitors and controls incoming and outgoing network traffic based on predetermined rules.

What is a firewall?

400

This professional designs and builds secure systems and networks to protect organizational assets.

Who is a Security Engineer?

400

Name 3 Linux Commands and their functions.

What is...ls, cd, pwd, mkdir, rm, rmdir, cp, mv, touch, cat, nano, vi, chmod, chown, ps, top, kill, grep, find, df etc...

400

This term refers to information collected from publicly available sources like websites and social media.

What is Open-Source Intelligence (OSINT)?

400

When was WiCyS National founded?

What is 2013?

500

This type of attack floods a network with excessive traffic, causing it to slow or crash.

What is a DDoS (Distributed Denial of Service) attack?

500

This cybersecurity leader manages teams, policies, and strategy to protect an organization’s information systems.

Who is a Chief Information Security Officer (CISO)?

500

Name 3 Cybersecurity Frameworks.

What is...NIST Cybersecurity Framework (CSF), ISO/IEC 27001, CIS Controls, COBIT, NIST SP 800-53, NIST Risk Management Framework (RMF), PCI DSS, SOC 2, HITRUST CSF, GDPR Framework, MITRE ATT&CK, FAIR Framework, NERC CIP, HIPAA Security Rule, ITIL Security Management, PCI-DSS etc....

500

This common encryption protocol secures data between browsers and websites.

What is TLS (Transport Layer Security)?

500

Free if you've been to at least 2 of our events this semester!

Havent attended? RSVP for our Intro to Cyberpolicy & Governance Seminar next week!