Cyber threats
Online safety
Hacking and Cybercrime
Encryption and privacy
Random
100

This common cyber threat is a type of software designed to harm or exploit devices.

What is malware

100

A strong password should include these three types of characters.

What are letters, numbers, and symbols

100

A person who illegally breaks into computers and networks.

What is a hacker

100

The process of scrambling data so only authorized users can read it.

What is encryption

100

This security system acts as a barrier between a trusted network and an untrusted network, blocking or allowing traffic based on set rules.

What is firewall

200

A hacker uses this type of attack to overload a website with traffic, making it crash.

What is a DDoS attack

200

The ā€œSā€ in HTTPS stands for this, meaning the website has extra protection.

What is secure

200

A "white hat" hacker is also called this because they help organizations find security flaws.

What is an ethical hacker

200

This tool helps create secure connections by hiding your internet activity.


What is a VPN

200

This type of network connects computers within a small area, like a school or office.

What is a Local Area Network

300

This type of scam tricks people into giving away personal information through fake emails or websites.

What is phishing

300

his feature in web browsers helps remember passwords but can be unsafe if hacked.

What is a password manager

300

The U.S. government agency responsible for investigating cybercrimes.


What is the FBI

300

This type of encryption uses the same key to both encrypt and decrypt data.

What is symmetric encryption

300

This website is a great starting point for beginners who want to learn about IT and cybersecurity and gain a certification.

What is CompTia

400

This type of cyber attack locks your files and demands payment to unlock them.

What is ransomware

400

This type of two-factor authentication sends a code to your phone to verify your identity.

What is SMS verification

400

A method where hackers guess passwords by trying many different combinations.

What is a brute force attack

400

Free points

;)

400

phishing can be considered what type of engineering

social engineering

500

This type of malware disguises itself as a legitimate program but performs harmful actions.

What is a Trojan horse

500

This security setting helps control what personal data apps can access on your phone.

What are app permissions

500

This type of hacker helps companies strengthen security by acting like a real attacker.

What is a penetration tester

500

The act of making data unreadable to unauthorized users by transforming it mathematically.

What is cryptography

500

In cybersecurity, this isolated environment is used to test suspicious programs without harming the main system

What is a sandbox

M
e
n
u