Online Safety
Common Threats
Password
Best Practices
Cybersecurity Terms
100

What should you check before clicking a link in an email?

the sender’s email address and if the URL looks legitimate.

100

what happen when you click on something malicious? 

person information can be stolen

100

What is a strong password made of?

A mix of upper/lowercase letters, numbers, and symbols.

100

How often should you update your software?

As soon as updates are available.

100

What does HTTPS stand for?

HyperText Transfer Protocol Secure.

200

Why is oversharing on social media risky?

It can give attackers personal info for scams.

200

What is social engineering in cybersecurity?

Manipulating people into giving up confidential information.

200

What is 2FA or MFA?

Two-Factor or Multi-Factor Authentication—extra layers of security

200

Why should you back up your files?

To recover them in case of ransomware or hardware failure.

200

What is a firewall?

A network security device that monitors and controls incoming/outgoing traffic.

300

what are some strong passwords. 

A combination of uppercase and lowercase letters, numbers and symbols.

300

what is spyware?

Spyware is a type of malware that secretly gathers user information without their knowledge.

300

Should you use the same password for multiple accounts?

No

300

Why is clicking unknown links risky?

hey may lead to malware.

300

What is malware?

Malicious software designed to harm or exploit systems.

400

What are the risks of using public WI-FI?

Can gain personal information and malware distribution.

400

What is a brute force attack?

A brute force attack is a method where attackers try all possible combinations of passwords or encryption keys until the correct one is found

400

What is a password manager used for?

Storing and generating strong, unique passwords.

400

What should you do if your account is hacked?

Change your password and enable MFA immediately.

400

What is encryption?

The process of converting data into code to prevent unauthorized access.

500

What is the best action if you receive a suspicious email from your bank?

Contact the bank directly (do not click links).

500

What type of attack floods a network with traffic to make services unavailable?

DDoS (Distributed Denial of Service) attack

500

What is a passphrase, and why is it secure?

A long phrase made of random words—easy to remember, hard to guess.

500

What should you do before selling or donating an old device?

Wipe all data securely.

500

What is the "principle of least privilege"?

Giving users only the access they need no more, no less

M
e
n
u