Previous All Posts Next

Cybersecurity Pop Quiz: Test Your Knowledge

Posted: February 1, 2017 to Cybersecurity.

Tags: Malware, Data Breach, Compliance

Think you are up-to-date on your Cyberknowledge? Take this quiz to find out!
  1. Noteworthy Cyberactivists
___ 1. This key player is the director of cybersecurity for the Electronic Frontier Foundation and has researched malware and coordinated security training initiatives. ___ 2. An outspoken digital security and privacy buff, this person gained notoriety after leaking NSA documents in 2013. ___ 3. This cybersecurity activist is known for educating minorities on everything from encryption to cybersecurity. ___ 4. Founded the Guardian Project, a company who develops security-focused mobile apps. ___ 5. A prolific cryptographer and privacy advocate writer who often focuses on questions of cybersecurity.
  1. Bruce Schneier
  2. Edward Snowden
  3. Nathan Freitas
  4. Matthew Mitchell
  5. Eva Galperin
  1. Noteworthy Cyberterms
___ 1. A cyber attack whereby a hacker is able to intercept data/communications by posing as the user’s legitimate target destination. ___ 2. A security measure requiring users to confirm their identity through a second mean of their choosing, usually with a verification code, before allowing user access to a site or service. ___ 3. A program that adds additional security and privacy to a user by running communications through multiple layers of encryption. ___ 4. An wide-ranging attempt to collect sensitive data from unsuspecting targets by impersonating a trusted and legitimate source. ___ 5. A system that allows a user to connect remotely with another network via secure encryptions over the internet. ___ 6. A targeted, malicious email whose goal is to trick a specific individual into revealing compromising data. ___ 7. A communications technology in which only the intended recipient of a message has the ability to decrypt it. ___ 8. Systems that attempt to block surveillance.
  1. End-to-end encryption
  2. Man-in-the-middle attack
  3. Privacy-enhancing technologies
  4. Phishing
  5. Spear phishing
  6. Tor browser
  7. Two-factor authentication
  8. Virtual private network (VPN)
EncryptoAnswers
  1. Noteworthy Cyberactivists: 1. E, 2. B, 3. D, 4. C, 5. A
  2. Noteworthy Cyberterms1. b, 2. g, 3. f, 4. d, 5. h, 6. e, 7. a, 8. C

Protect Your Business Today

Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now