Malware Scenarios (MC/Hint = 50% of answer points) Scenarios (MC/Hint = 50% of answer points) Strict Defenses Scenarios (MC/Hint = 50% of answer points) More Defense Scenarios (MC/Hint = 50% of answer points) Random/Bonus Scenarios (MC/Hint = 50% of answer points)
200
Worms
Which malware spreads copies of itself from computer to computer without human interaction?

A) Worms
B) Viruses
C) Bots/Zombies
D) Adware
100
Ad Blocker
Allan wants to watch anime on a website, but it has too many inappropriate ads. What can Allan use to block the ads?

A) Ad Blocker
B) Adware
C) Ed, Edd, and Eddy
D) Meds
500
DDoS
Angela fortified all her IoT devices. What is she trying to avoid?

A) Tax fraud
B) Man-in-the-Middle
C) DDoS
D) Insecure Wi-Fi
500
SQLi
Mr. Perez maneuvered code from a relational database and inoculated it into a web page that sells athletic objects. He does this to compromise the details of those who enter their data in the site. What did he use?

A) XSS
B) SQLi
C) A broom
D) Man-in-the-Middle
200
Keylogging/Spyware
Armin was on his computer. He was looking at his bank statements and logged in to his account. An attacker has noted his password as he typed it. What attack did the hacker use?

A) Social Engineering
B) Keylogging/Spyware
C) Bring out the colossal titan
D) DNS spoofing
100
Trojans
Which malware seems legitimate, but contains a harmful download? (It masquerades as a genuine program)

A) Adware
B) Ransomware
C) Trickware
D)Trojans
300
MiTM
Richard is chatting with his friend on a specific program. Him and his friend talk about how great Attack on Titan is, and are compelled to attend an anime convention. Richard insists on paying, so he sends his friend his credit card to purchase tickets. An unauthorized purchase was made on his card, but his friend didn't make it. What is this attack called?

A) Social Engineering
B) Spoofing
C) SSL Hijacking
D) Man-in-the-Middle
400
XSS
Tamim went to a legitimate website for Fortnite tips. When he went, malware was downloaded on his computer. The website was compromised. What is this called?

A) Physical Security Flaw
B) XSS
C) Weak Configuration/Permissions
D) SQLi
200
USB lock
Mario failed to put a USB lock in a server and it got physically hacked. What could he have done to stop this?

A) Get the star power
B) Install the USB lock
C) Beat bowser
D) Monitor the network
200
Bots/zombies
What is a program that only you can control and can flood servers?

A) Rootkits
B) Viruses
C) Bots/zombies
D) Worms
300
Rootkits
What is a set of software tools that allows an attacker to gain full-, usually-remote access to computer while staying undetected?

A) Keyloggers
B) Rootkits
C) Spyware
D) Resident Virus
200
Firewall
Angie wants to set up her home connection. She wants it secure and wants to use a device that can filter ongoing traffic. Which defense does this (alone)?

A) VPN
B) The Quicker Picker Upper
C) Firewall
D) Liberty Mutual
500
Zero-Day Exploit
Mr. Perez failed to update his computer software. His security information was compromised, including the very credit card he used to find products that encourage hair growth (this was definitely NOT Prabhjot). What attack instance is this?

A) Physical Security Exploit
B) Zero-Day Exploit
C) The Perez Shazam
D) SQLi
100
Joshwa
John has Wi-Fi with WPA. Joshwa has Wi-Fi with WPA2. Who's Wi-Fi is more secure?

A) Joshwa
B) John
Water damage occurred. Water's chemical formula is H2O. Hydrogen, an element of water, is a semi-conductor, hence why the parts were fried. This is known as short-circuiting.
Lelouch went on his dad's computer. He tried to turn it on, but it didn't work. He opened the computer and saw rust on the motherboard-- the circuit board was fried. He cried out in agony and, for some reason, blamed Tyler (it's always Tyler)! Please explain what caused this and the science behind it. Also, you have to give Prabhjot (yes only Prabhjot) chocolates *most important step.
400
Rainbow Table
What is a term for an attack that is used for catching the output of cryptographic hash functions?

A) Keyline
B) Rainbow Table
C) Redline
D) Hash
100
Compromised Password
Richard uses the same password for every website. He tries to sign into YouTube one day, but it wasn't working. What happened?

A) He has Ligma
B) His password is compromised
C) Taheem broke into his house, smirking and drooling, and took his locked laptop
D) Richard didn't delete his cache, so his data has been stolen
100
Weak Configuration/Permissions
Taheem has a visiting guest named Onkar. Onkar needs to use his computer for something. Taheem let him use the guest account. Onkar logged in and downloaded malware mistakenly and had access to other accounts. Is the configuration weak or strong?

A) Weak Configuration/Permissions
B) It's giving bozo
C) Insecure Wi-Fi
D) DaBaby
500
MAC spoofing
Light Yagami wanted to infiltrate a particular detective's network. He wasn't on the whitelist. What could you do to go on the network.

A) DoS
B) Access Control
C) Get the Death Note
D) MAC spoofing
300
Cryptography
What is it called when you protect information by encrypting it to a secure format?

A) Cryptography
B) DDL
C) Brute force
D) Secure signatures
100
Ransomware
Which malware locks user files and demands payment to release the compromise?

A) Ransomware
B) Viruses
C) Payoff
D) Adware
400
Social Engineering
Bessy ate too many Doritos and looked on Google to help her cure her stomach ache. She came across a site that would give her medicine. They asked her credit information, password, email, DOB, and her mother's maiden name. What is this an example of?

A) Misunderstanding of health
B) Spoofing
C) Social Engineering
D) Virus
100
Data backup
Often little-none people do this on their device manually. It is usually automatic and helps to load to a previous save.

A) Data backup
B) Spoofing
C) Building security
D) Access control
400
Human resources
Ronnie is a new employee at the CaEring company. He was provisioned security policies buy which domain of the company?

A) Senior manager
B) Employee 1
C) CEO
D) Human resources
300
Adware
Tanjiro was on an inappropriate site and clicked on a certain ad. Afterwards, he got blooded with pop-up ads. What is this type of malware?

A) Social engineering
B) Phishing
C) Spyware
D) Adware






Game of Cyber

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline