The IT Certification Resource Center

Featured Deal

Get CompTIA, Cisco, or Microsoft training courses free for a week.
Learn More ❯

Happy Final Day of National Cyber Security Awareness Month

'Tis the season for spooky stuff! Before you go trick-or-treating or participate in other festive holiday revels, test your knowledge of malware, viruses and famous hacks!

Halloween pumpkin for cybersecurityBoo! Something wicked this way comes, kiddies. Here in the United States, where GoCertify has its global headquarters, we're celebrating Halloween, which is some people's absolute favorite holiday on the calendar, and makes other people want to punch the whole world in the face.


Whichever camp you fall into, we have a fun holiday treat from our friends at Certification Magazine. October is also National Cyber Security Awareness Month, so in honor of the final day of that observance, the CertMag team has created a topical quiz and graciously allowed us to repost it here.


See how you do! And don't forget to click to Page 2 of this article for answers.


1) The 1989 launch of the space shuttle Atlantis was complicated by WANK, a playfully anarchic computer worm eventually traced to a handful of Australian hackers including a teenager using the handle “Mendax.” What was this young rogue’s actually identity?


2) What is the name of the countermeasure created to expunge Creeper, the self-replicating program that waged one of the earliest known virus attacks in 1971?


3) What entity first discovered the Stuxnet worm, allegedly created by U.S. and Israeli security forces, that targeted Iran’s nuclear program in 2010?


4) What was the first IBM PC-compatible virus, deployed in January 1986?


5) What was the first known ransomware virus and when did it first appear?


6) What female tennis player was used as bait by a worm released Feb. 11, 2001?


7) What boot sector virus, named for a Renaissance painter and Teenage Mutant Ninja Turtle, was first discovered on Feb. 4, 1991?


8) What computer virus famously arrived via e-mail with a message proclaiming, “Here is that document you asked for, don’t show it to anybody else”?


9) Though its name may cause many to think of a Sith lord from Star Wars: Attack of the Clones, this malware was actually named for a file prefix it assigns. What is it?


10) What hacker notoriously proved his digital bona fides by cracking the U.S. Department of Defense computer network in less than one minute?