I’m the first line of defense against online threats. I block unwanted visitors and keep your network safe. What am I?
Firewall
What does "IP" stand for?
Internet Protocol
What does "Wi-Fi" stand for?
Wireless Fidelity
Clicking on unknown links is a good practice. True or False?
False
Public Wi-Fi networks are safe for accessing sensitive information.True or False?
False
i am a security code that allows access to a computer or a specific program.
Password or Passcode
I am a type of attack, i lock your files until a ransom is paid.
Ransomware
I'm a security measure that requires users to provide two or more forms of identification to access a system.
What is the term for unauthorized access to computer systems?
Hacking
To prevent data loss in case of hardware failure, cyber attacks, or accidental deletion, one should normalize
Regular Backups
i am a type of software that is designed to detect and remove viruses. What am i?
Antivirus
Information you leave about yourself online through postings, photographs, and videos can create?
Virtual Footprint
I am a short-ranged wireless protocol for exchanging data
Bluetooth
i am a weakness or flaw in a system that can be exploited by attackers.
Vulnerability
What does "VPN" stand for
Virtual Private Network
I'm the process of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Cybersecurity
I help you to direct traffic between different networks.
Router
I help you manage and store your passwords securely.
Password Managers
I am a malicious software designed to harm, exploit, or otherwise compromise computer systems.
Malware
Applying updates to software to fix vulnerabilities and improve security is called?
Patching
I'm a technique used to protect data by converting it into a code that is unintelligible to anyone who does not have the decryption key.
Encryption
I'm a type of malware that replicates itself and spreads to other computers without the user's knowledge or consent.
Worm
i am a malicious software that enters a computer and tracks and gathers personal information. What am i?
Spyware
I help you encrypt your internet connection and hide your IP address, providing privacy and security online.
VPN
Suspicious links, spelling mistakes, and urgent messages prompting immediate action, are related to what concept in cybersecurity
Phishing email