This type of attack uses fake emails or messages to trick users into giving personal information.
Phishing
This type of attack manipulates people into revealing confidential information
social engineering
This type of malware spreads by attaching itself to files and programs.
virus
which one is a good password
A. 1234
B. password
C. 0000
D. Pas$w0rD!!
D. Pas$w0rD!!
which one is Physical Security
A. door
B. firewall
C. anti virus
A. door
This phishing method targets a specific individual or organization with personalized messages
spear phishing
This tactic involves pretending to be someone trustworthy to gain access or information
pretexting
This malware disguises itself as legitimate software
Trojan horse
This security method requires a second form of verification beyond a password
multi-factor authentication
This device controls entry by requiring a badge, keycard, or code
access control system
This common sign of phishing includes urgent language like “Act now or your account will be locked.”
a sense of urgency
This attack leaves infected USB drives in public places hoping someone will plug them in
baiting
This type of malware locks your files and demands payment to unlock them
ransomware
This bad habit involves using the same password across multiple sites
password reuse
This surveillance method uses cameras to monitor activity
CCTV or security cameras
This is the process of checking a link by hovering over it before clicking
link previewing or hovering over a URL
This method involves following someone into a secure building without proper authorization
tailgating
This malware can spread across networks without user interaction
worm
This tool securely stores and generates passwords
password manager
This security risk involves someone looking over your shoulder to see sensitive information
shoulder surfing
This type of phishing attack uses phone calls instead of emails
vishing
This psychological principle relies on people’s tendency to obey authority figures
authority or authority bias
This type of malware secretly records keystrokes to steal information
keylogger
This type of attack tries many password combinations quickly using automation
brute force attack
This practice ensures that sensitive documents are properly destroyed
shredding