1. Which industry is the most targeted by cybercriminals? Healthcare
2. Which of the following is NOT a common cybersecurity best practice? Using the same password for multiple accounts
3. What is the term for the act of secretly observing and recording someone's keystrokes on a computer? Keylogging
4. Which type of cyber attack aims to deceive users into providing sensitive information? Phishing
5. What’s a common scam around tax season? “You’re being audited” phishing messages
6. What is the process of making digital data unreadable to unauthorized users? Encryption
7. What do the initials 'DDoS' stand for in relation to cyber attacks? Distributed Denial of Service
8. What should you do first if you suspect a phishing attack? Report it to IT or security
9. What is the term for a security measure that verifies the identity of a user by combining two or more different authentication factors? Two-factor authentication
10. What does MFA stand for in cybersecurity? Multi-Factor Authentication
11. Crack the password!. plantmom
12. What company was hacked in 2017, exposing 147 million people’s data? Equifax
13. Which of the following is a common method used by hackers to gain unauthorized access to a computer network? Brute-force attack
14. What’s the term for an attack where the system is overwhelmed with traffic? DDoS
15. Who are White hat hackers? Ethical hackers
16. Which of the following is an example of a strong password? 5Tr0ngP@55w0rd!
17. What’s a common trick in a fake login page? Misspelled domain
18. What is the term for a software that appears to perform a desirable function but actually performs malicious actions? Trojan
19. What is the most common way hackers gain access to systems? Phishing emails
20. What is the term for a program that replicates itself and spreads to other computers? Virus
21. What is the purpose of a firewall? Block unauthorized access to your device
22. What is the term for a type of malware that blocks access to a computer system until a ransom is paid? Ransomware
23. What cybersecurity tool is used to store login credentials securely? Password Manager
24. What is “social engineering” in the context of cyberattacks? Manipulating people into giving away information
25. What is the term for unauthorized access to data or systems? Hacking
26. What is the first line of defense in protecting against cybersecurity threats? User awareness
27. What kind of cybersecurity threat is a “Trojan horse”? A disguised malware program
28. What is the term for a software vulnerability that can be exploited by hackers? Zero-day
29. What is the most commonly used password worldwide? 123456
30. Which of these is a real secure messaging app? Signal
31. What does the “S” in “HTTPS” stand for? Security
