Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.

Location

333 West San Carlos Street
San Jose, California 95110
United States

WWW: acer.com

ChannelPro Network Awards

hello 2
hello 3

Business Tools

January 28, 2026 |

MSP Trivia Night: Sharpen Your Industry Knowledge

IT doesn’t have to be all alerts and audits. This fun, source-backed trivia helps MSPs reinforce security fundamentals, sharpen business instincts, and learn together as a team.

IT can get heavy sometimes, especially cybersecurity. Tickets pile up, alerts don’t sleep, and every “quick fix” somehow becomes a three-hour adventure. That’s exactly why it helps to keep things fun. Things like MSP memes and great trivia sparks a conversation, encourages curiosity, and fosters big picture thinking.

Use these questions to quiz your staff, because the teams that learn together win together.



Tech & Internet

1. Which company introduced the first widely adopted smartphone in 2007?
Answer: Apple. The first smartphone, IBM Simon, launched in 1994. It didn’t sell well due to its size and cost.

Source: Apple – Apple Reinvents the Phone with iPhone


2. Why is using plain FTP considered risky for MSP-managed environments? What protocol fixes that risk?
Answer: Plain FTP transmits credentials and data in cleartext, making it vulnerable to interception. SFTP fixes this by encrypting authentication and file transfers over SSH.

Source: AWS – What is SFTP?


3. What Microsoft research effort tested underwater data centers?
Answer: Project Natick.

Source: Microsoft Research (Project Natick)


4. In 2026, roughly how many people worldwide will rely on the internet for work, commerce, and services? What does that imply for downtime risk?
Answer: About 6.1 billion people. That highlights how even brief outages can have massive global impact.

Source: DataReportal.com</a >


5. What global organization coordinates IP address allocation and other core internet identifiers?
Answer: IANA (Internet Assigned Numbers Authority).

Source: IANA official site


6. What internet routing protocol, when misconfigured or hijacked, can take major websites offline worldwide?
Answer: BGP (Border Gateway Protocol), which controls how traffic is routed between networks on the internet.

Source: Cloudflare – What is BGP?


7. What cloud computing concept lets developers build and run code without managing servers?
Answer: Serverless computing.

Source: IBM – Serverless vs Microservices


8. Why do outages in one SaaS feature sometimes not take down the entire platform? What architecture enables that?
Answer: Microservices architecture, which separates applications into independently deployable services.

Source: Atlassian – Microservices explained


9. What technology protects client login pages and admin portals from eavesdropping and tampering on the web?
Answer: TLS (Transport Layer Security), which encrypts web traffic and verifies server identity.

Source: IETF – TLS 1.3 (RFC 8446)


10. What core technology makes modern MSP hosting, private clouds, and disaster-recovery platforms possible?
Answer: Hypervisor-based virtualization, which allows multiple virtual machines to run on a single physical server.

Source: VMware – Virtualization overview


11. What technology helps MSPs improve website performance including page load times?
Answer: Content Delivery Networks (CDNs), which cache content closer to users to reduce latency and outages.

Source: Cloudflare – What is a CDN?


Security and Compliance

1. What’s one high-level reason MSPs are considered “high-leverage” targets for attackers?
Answer: Compromising an MSP tool or account can provide access to many client environments (a supply-chain multiplier).

Source: U.S. ODNI / NCSC (PDF)


2. What modern authentication concept allows login without passwords using cryptographic credentials?
Answer: Passkeys.

Source: Google – Passkeys update


3. NotPetya is widely described as one of the most damaging cyberattacks ever. What damage figure is commonly cited?
Answer: Roughly $10 billion in damages.

Source: WIRED


4. In the famous IoT casino incident, what device was cited as the entry point for hackers?
Answer: An internet-connected fish tank thermometer/sensor.

Source: Entrepreneur


5. What cybersecurity framework organizes work into Identify, Protect, Detect, Respond, and Recover?
Answer: The NIST Cybersecurity Framework (CSF)

Source: NIST (Five Functions)


6. What cybersecurity concept assumes no user or device should be trusted by default?
Answer: Zero Trust

Source: NIST SP 800-207 (Zero Trust Architecture) (PDF)


7. What security principle limits users to only the access they need?
Answer: Least privilege

Source: NIST CSRC Glossary (Least Privilege)


8. Which international standard defines requirements for an Information Security Management System (ISMS)?
Answer: ISO/IEC 27001

Source: ISO (ISO/IEC 27001)


9. Which standards body publishes the WebAuthn specification used for modern passkeys?
Answer: The World Wide Web Consortium (W3C)

Source: W3C WebAuthn specification


10. What standards-based approach is commonly used for phishing-resistant sign-in with passkeys?
Answer: FIDO2 / WebAuthn

Source: W3C WebAuthn specification


11. What legal obligation requires businesses to disclose certain data breaches?
Answer: Breach notification laws
Source: FTC (Data breach response guide)

12. What is the name of the CISA list that helps defenders prioritize vulnerabilities proven exploited “in the wild?”
Answer: The Known Exploited Vulnerabilities (KEV) Catalog

Source: CISA (KEV overview)


13. Which NIST publication is the classic “go-to” guide for handling security incidents?
Answer: NIST SP 800-61 (Computer Security Incident Handling Guide)

Source: NIST CSRC (SP 800-61)


14. In modern NIST password guidance, what’s the general stance on forced periodic password changes?
Answer: Don’t require routine password resets unless there’s evidence of compromise.

Source: NIST (SP 800-63B)


15. What’s the name of the public knowledge base that maps adversary tactics and techniques (used heavily in detection engineering)?
Answer: MITRE ATT&CK

Source: MITRE ATT&CK


16. What type of attack are passkeys designed to help reduce?
Answer: Phishing (by replacing passwords with cryptographic credentials).

Source: Apple Developer (WWDC: Meet passkeys)


17. NIST discussed the proposed deprecation of what common MFA method due to risk?
Answer: SMS-based out-of-band authentication

Source: NIST (Cybersecurity Insights blog)


18. In cloud security, what model says the provider secures “of” the cloud while customers secure “in” the cloud?
Answer: The Shared Responsibility Model

Source: AWS (Shared Responsibility Model)


19. CISA recommends a simple backup resilience pattern. What’s the “3-2-1” rule?
Answer: 3 copies of data on 2 media types with 1 copy offsite.

Source: CISA (Data Backup Options PDF)


20. In NIST incident response guidance, what’s the name of the step where you confirm and scope what happened before action?
Answer: Detection & Analysis as part of the incident response lifecycle

Source: NIST (SP 800-61)


21. What’s the term for a concise, repeatable set of steps teams follow during incidents to speed response?
Answer: A runbook, often paired with playbooks

Source: Atlassian (Runbooks in incident management)


22. Under the SEC’s cyber disclosure rules, how soon must companies generally file an Item 1.05 Form 8-K after determining an incident is material?
Answer: Generally within four business days of the materiality determination

Source: U.S. SEC (Final rules fact sheet PDF)


23. Under the GDPR, what’s the maximum administrative fine tier for the most severe violations?
Answer: Up to 20 million euro or 4% of global annual turnover, whichever is higher

Source: EUR-Lex (GDPR text)


24. In HIPAA breaches, what’s the latest allowed timing for notifying affected individuals?
Answer: Without unreasonable delay and no later than 60 days after discovery

Source: HHS (HIPAA Breach Notification Rule)


25. Under the FTC Safeguards Rule (GLBA), what authentication control is explicitly required for access to information systems (with limited exceptions)?
Answer: Multi-factor authentication (MFA)

Source: eCFR (16 CFR 314.4)


IT Business Growth and Operations

1. What free Google tool helps MSPs manage how their business appears in Google Search and Maps?
Answer: Google Business Profile

Source: Google Business Profile


2. What type of online behavior can trigger restrictions on Google Business Profiles?
Answer: Fake or manipulated reviews and engagement (policy violations)

Source: Google Help (Business Profile restrictions for policy violations)


3. What customer-loyalty concept did Harvard Business Review call “the one number you need to grow?”
Answer: Net Promoter Score (NPS)

Source: Harvard Business Review


4. In the NPS model, what customer behavior is the core signal of loyalty?
Answer: Recommending the company to others

Source: Harvard Business Review


5. What cloud deployment model combines on-premises systems with public cloud services?
Answer: Hybrid cloud

Source: Microsoft Azure (hybrid cloud)


6. What Microsoft partner program allows MSPs to resell and manage Microsoft cloud services?
Answer: The Cloud Solution Provider (CSP) program

Source: Microsoft Learn (CSP overview)


7. Which Microsoft portal is the official entry point for CSP enrollment and management?
Answer: Partner Center

Source: Microsoft Learn (CSP overview)


8. Why do MSPs emphasize recurring revenue as a growth lever?
Answer: It supports predictable, contract-based revenue and long-term customer relationships.

Source: ChannelPro Network (recurring revenue)


9. What sales approach encourages MSPs to sell business outcomes instead of tools?
Answer: Value-based selling

Source: HubSpot (value-based selling)


10. What cybersecurity service monitors environments 24×7 for threats and helps coordinate response?
Answer: SOC-as-a-Service (SOCaaS)/managed SOC

Source: Microsoft Security (SOCaaS)


11. What cybersecurity capability focuses on detecting and responding to suspicious activity on endpoints?
Answer: Endpoint Detection and Response (EDR)

Source: NIST CSRC Glossary (EDR)


MSP Industry

1. In what year was HP Inc. founded?
Answer: Hewlett-Packard was founded in 1939 by Bill Hewlett and David Packard in a one-car garage in Palo Alto, CA.

Source: Britannica.com


2. Which NBA team plays its home games at the Kaseya Center (named after the MSP software provider Kaseya)?
Answer: The Miami Heat

Source: Kaseya (Kaseya Center – Home of the Miami Heat)


3. ChannelPro Network is part of what parent company that’s often abbreviated “CRA?”
Answer: CyberRisk Alliance.

Source: ChannelPro Network


4. What’s the oldest peer organization in the managed IT industry?
Answer: The ASCII Group was founded in 1984.

Source: ChannelPro Network


5. Which authors wrote The Pumpkin Plan for Managed Service Providers, a popular book on client selection and management?
Answer: Dave Cava and Shawn Walsh wrote it, based on the bestseller by Mike Michalowicz.

Source: ChannelPro Network


6. Which MSP owner and podcaster is affectionately known as Uncle Marv?
Answer: Marvin Bee

Source: Unclemarv.com


Featured image: noviyanita — stock.adobe.com

Related Business Tools, Resources

Free MSP Resources

Editor’s Choice


Explore ChannelPro

Events

Reach Our Audience