What does 2FA stand for?
Two-Factor Authentication
What type of scam tricks people with fake emails?
Phishing
What setting should you turn off to hide your real-time location?
Location sharing
What should a strong password contain?
Letters, numbers, symbols
What do you call a hacker who helps improve security?
White-hat hacker
What does the “S” in HTTPS stand for?
Secure
What malware locks files and demands payment?
Ransomware
What is it called when someone pretends to be someone else online?
Catfishing
What tool stores and manages your passwords?
Password manager
What is India’s main cyber law?
IT Act
What is PII short for?
Personally Identifiable Information
What malware runs in the background and steals sensitive data?
Spyware
What kind of scam promises fake prizes or giveaways?
Online scam
What attack happens when you reuse passwords?
Credential stuffing
What European law protects online privacy?
GDPR
What is a security flaw hackers exploit before it’s fixed?
Zero-day exploit
What cyberattack tricks a user into installing malware by disguising it as a legitimate file?
Trojan horse
What do social media platforms collect to show personalized ads?
User data
What security method uses fingerprints or face scans?
Biometric authentication
What is it called when you access an account without permission?
Hacking
What tool hides your IP address for privacy?
What attack infects multiple devices and turns them into a remotely controlled bot network?
Botnet
What is your permanent online history called?
Digital footprint
What makes longer passwords harder to crack?
Password entropy
What is the illegal act of spreading lies online?
Cyber defamation