Online Privacy & Security
Cyber Threats & Attacks
Safe Social Media Practices
Passwords & Authentication
Ethical Hacking & Cyber Laws
100

What does 2FA stand for?

Two-Factor Authentication

100

What type of scam tricks people with fake emails?

Phishing

100

What setting should you turn off to hide your real-time location?

Location sharing

100

What should a strong password contain?

Letters, numbers, symbols

100

What do you call a hacker who helps improve security?

White-hat hacker

200

What does the “S” in HTTPS stand for?

Secure

200

What malware locks files and demands payment?

Ransomware

200

What is it called when someone pretends to be someone else online?

Catfishing

200

 What tool stores and manages your passwords?

Password manager

200

What is India’s main cyber law?

IT Act

300

What is PII short for?

Personally Identifiable Information 


300

What malware runs in the background and steals sensitive data?

Spyware

300

What kind of scam promises fake prizes or giveaways?

Online scam

300

What attack happens when you reuse passwords?

Credential stuffing

300

What European law protects online privacy?

GDPR

400

What is a security flaw hackers exploit before it’s fixed?

Zero-day exploit 

400

What cyberattack tricks a user into installing malware by disguising it as a legitimate file?

Trojan horse

400

What do social media platforms collect to show personalized ads?

User data

400

What security method uses fingerprints or face scans?

Biometric authentication

400

What is it called when you access an account without permission?

Hacking

500

What tool hides your IP address for privacy?

VPN
500

What attack infects multiple devices and turns them into a remotely controlled bot network?

 Botnet

500

What is your permanent online history called?

Digital footprint

500

What makes longer passwords harder to crack?

Password entropy

500

What is the illegal act of spreading lies online?

Cyber defamation

M
e
n
u