Malware/Viruses
Artificial Intelligence
Account Security
Data Protection/Integrity
Digital Privacy
100

Type of malware that encrypts the user's data and demands money (usually in cryptocurrency) for the "key" to unlock it

What is ransomware

100

Online check/test used by websites to determine if the user performing the actions a human or a bot 

What is a captcha/Turing test

100

1 good practice for creating strong passwords

or bad practice for creating strong passwords

(List one practice for creating a strong password and say if it is good)

What are

using long passwords with multiple words, characters, numbers and symbols

or 

Not using personal information, sequential or repetitive characters, common words or phrases, variations of the same weak base

100

Most common (but not most secure) way that information on computers and mobile devices is protected from unauthorized access

What are PINs and passwords

100

Browser tool used to block and alter unwanted elements and malicious content from loading

What is an ad blocker

200

Type of malware that records to users keystrokes and passwords and sends them to an attacker

What is a keylogger

200

The type of AI that powers models like ChatGPT, Claude, Deepseek, and other online chatbots

What are LLMs (Large language models)

200

Software tool that prevents reusing credentials by automatically generating, autofilling, and storing login information for websites and apps

What is a password manager
200

Attack that involves tricking the user into compromising important data by impersonating a trustworthy source

What is phishing

200

Small files stored on you device to track your online activity and remember you across website visits

What are cookies

300

Type of malware pretends to be benign software but causes damage and runs malicious code once installed

What is a trojan horse

300

Information that AI companies use to teach artificial intelligence models how to recognize patterns, classify information, and make predictions

What is training data
300

Important method that requires different (multiple) forms of verification to prove that the user is who they claim they are

What is 2fa

(two factor verification)

300

Process of copying important data and files to other locations in case the original copy is lost or destroyed

What are creating backups

300

An alternate identity/persona often used to hide one's real self and protect personal information online

What are aliases, pseudonyms, alter egos, etc

400

A vulnerability that is unknown to software maintainers that is often sold exploited in advanced (usually nation state) malware

What is a zero-day

400

Fake audio or video created by AI to make it look like someone said something they didn't

What is a deepfake

400

Contact details, such as a (recovery) email addresses or phone numbers, that users add to their accounts to regain access if they are locked out or forget their password

What is recovery information
400

Incident where a company or individual "leaks" often sensitive information due to misconfigured policies or systems

Data breach/leak

400

Document that explains what data a company collects and how they use it

You often need to agree to it before you sign-up for an online service

What is a privacy policy
500

Type of malware that specializes in persistence even across operating system updates and reinstalls

What is a Rootkit (or backdoor)

500

Artificial intelligence model that can accomplish a specific goal on its own with limited supervision and human interaction

What is agentic/(autonomous) AI

500

The most secure type of authentication often used to protect critical accounts and infrastructure

What are FIDO2/Passkeys/Hardware keys


500

Process that uses math, various algorithms, and "keys" to protect from unauthorized access by making it indecipherable without the correct key

What is encryption

500

Tool that creates a secure and encrypted tunnel between your device and a remote server, used to mask your real IP address and location to protect your privacy

What is a VPN

M
e
n
u