Tricks and traps online.
Nasty software and how to avoid it
Protecting your digital connections.
Keeping your information safe
What to do when things go wrong.
100

What is the term for a deceptive email that tries to trick you into revealing personal information?

Phishing

100

What type of malware encrypts your files and demands a ransom for their release?

Ransomware

100

What does "VPN" stand for?

Virtual Private Network

100

What is "PII"?

Personally Identifiable Information

100

What is the first step in incident response?  

Preparation

200

What is a common tactic used in social engineering where an attacker pretends to be someone you trust?

Impersonation

200

What is a "Trojan Horse"? 


Malware disguised as a legitimate program.

200

What is a firewall?

A security system that controls network traffic.

200

 What is data encryption?

Converting data into an unreadable format.

200

What is "forensics" in the context of cybersecurity?

The process of investigating a security incident.

300

What is "pretexting" in the context of social engineering?

Creating a believable scenario to manipulate someone.

300

What does "antivirus software" do?

Detects and removes malware.

300

What is the purpose of a strong password?

To protect against unauthorized access.

300

 What is the importance of regularly backing up your data?

To protect against data loss.

300

What is a "vulnerability assessment"

Identifying weaknesses in a system.

400

What is a "watering hole" attack?

Compromising a website frequently visited by the target.

400

What is a "zero-day exploit"?

An attack that takes advantage of a previously unknown vulnerability.

400

 What is a "DDoS" attack?

Distributed Denial of Service attack

400

What is "data breach"?

A security incident where sensitive data is accessed without authorization.

400

What is the importance of having an incident response plan?

To ensure a coordinated and effective response to security incidents.

500

What is the best way to verify the legitimacy of a link in an email

Hover over the link without clicking to see the actual URL, or contact the supposed sender directly through a known, trusted channel.

500

What is the difference between a virus and a worm?

 A virus requires a host file to execute, while a worm can self-replicate and spread independently.

500

What is "two-factor authentication" (2FA)?

A security measure that requires two forms of verification.

500

What is the common data privacy Policy and regulation in the Philippines? 

The Republic Act 10173, officially known as the Data Privacy Act of 2012 (DPA) 

500

What is a "post-mortem" in incident response?

A review of the incident to identify lessons learned.

M
e
n
u