phishing
social engineering
malware
password Security
Physical Security
100

This type of attack uses fake emails or messages to trick users into giving personal information.

Phishing

100

This type of attack manipulates people into revealing confidential information

social engineering

100

This type of malware spreads by attaching itself to files and programs.

virus

100

which one is a good password

A. 1234

B. password

C. 0000

D. Pas$w0rD!!

D. Pas$w0rD!!

100

which one is Physical Security

A. door

B. firewall

C. anti virus

A. door

200

This phishing method targets a specific individual or organization with personalized messages

spear phishing

200

This tactic involves pretending to be someone trustworthy to gain access or information

pretexting

200

This malware disguises itself as legitimate software

Trojan horse

200

This security method requires a second form of verification beyond a password

multi-factor authentication

200

This device controls entry by requiring a badge, keycard, or code

access control system

300

This common sign of phishing includes urgent language like “Act now or your account will be locked.”

a sense of urgency

300

This attack leaves infected USB drives in public places hoping someone will plug them in

baiting

300

This type of malware locks your files and demands payment to unlock them

ransomware

300

This bad habit involves using the same password across multiple sites

password reuse

300

This surveillance method uses cameras to monitor activity

CCTV or security cameras

400

This is the process of checking a link by hovering over it before clicking

link previewing or hovering over a URL

400

This method involves following someone into a secure building without proper authorization

tailgating

400

This malware can spread across networks without user interaction

worm

400

This tool securely stores and generates passwords

password manager

400

This security risk involves someone looking over your shoulder to see sensitive information

shoulder surfing

500

This type of phishing attack uses phone calls instead of emails

vishing

500

This psychological principle relies on people’s tendency to obey authority figures

authority or authority bias

500

This type of malware secretly records keystrokes to steal information

keylogger

500

This type of attack tries many password combinations quickly using automation

brute force attack

500

This practice ensures that sensitive documents are properly destroyed

shredding

M
e
n
u