Security trivia

Related Trivia

Encryption, cybersecurity types, and the mechanics of hacking.

Security Mini Quiz

Test your knowledge with these top questions!

Question 1

Which British scientist led the team that cracked the Enigma at Bletchley Park?

Turing designed the Bombe, an electromechanical device used to crack Enigma. His team's work is estimated to have shortened the war by at least two years.

Question 2

Which math process turns data into a fixed-length string of characters?

Hashing is a deterministic process. The same input always produces the same fixed-length output, but it is designed to be practically impossible to reverse.

Question 3

Which practice hides a secret message inside a normal digital image?

Steganography hides a message's existence, whereas cryptography hides its meaning. Digital versions often modify the least significant bits of an image's pixel data.

Question 4

Which security risk involves watching a victim type their secret password?

Shoulder surfing can occur from a distance using binoculars or long-range cameras. Privacy filters mitigate this by narrowing the viewing angle of a digital display.

Question 5

Which scam uses fake phone calls to reveal secrets?

Vishing combines voice and phishing. Scammers often use caller ID spoofing to make their calls appear as if they are coming from a trusted bank or government agency.

Question 6

Which scam uses fake emails to steal private passwords?

The first phishing attacks targeted AOL users in the mid-1990s to steal login credentials. The ph spelling is a nod to an early form of hacking known as phreaking.

Question 7

Which term describes following an employee through a secure door?

Tailgating is a form of social engineering that exploits human politeness, as many people feel it is rude to close a door on someone following closely behind them.

Question 8

Which threat involves leaving infected USB drives in public areas?

A University of Illinois study found that 45% of people who pick up discarded USB drives will plug them into their computers and open the files.