Cyber
Security 🛡️
Secure
Travel ✈️
Phishing 🎣
Password
Protection 🔐
Basic ⌨️
Keyboard Shortcuts
100

What does the acronym "VPN" stand for?

Virtual Private Network

100

Why is it dangerous to connect to a public Wi-Fi Network? 

The data can be easily intercepted by a Bad Actor. 

100

What is phishing?

A method of tricking people into revealing personal information via fake emails or websites.

100

What is a strong password made of?

 A mix of letters, numbers, and special characters.

100

What does Ctrl + C do?

Copy.

200

What is the name of the malicious software that demands payment to unlock files?

Ransomware

200

What is a common way to protect your devices from theft while traveling?

 Use a lock or keep them in a secure bag.

200

What is a common sign of a phishing email?

Spelling errors, urgent language, or suspicious links.

200

What tool helps you store and manage complex passwords securely?

 Password Manager or Vault.

200

What does Ctrl + V do?

Paste.

300

Which data type does not need to be secured? 

Publicly Available Information.

300

True or False - posting your live location while away, is equivalent to leaving your home door unlocked. 

True.

300

What is "Spear Phishing"?

A targeted phishing attack aimed at a specific individual or organization.

300

What is two-factor authentication (2FA)?

 A security process requiring two forms of identification.

300

What shortcut locks your Windows computer?

Windows + L

400

What is the process of converting data into a coded format to prevent unauthorized access?

 Encryption.

400

What is the best way to ensure your data is safe if your device is stolen?

Enable full-disk encryption and remote wipe.

400

What should you do if you suspect an email is a phishing attempt?

 Do not click links, report it, and delete it.

400

Why should you avoid using the same password for multiple accounts?

 It increases the risk if one account is compromised.

400

What does Windows + P do?

Opens the Projection Menu.

500

What is the term for a security hole in software that is unknown to the vendor?

 Zero-day vulnerability.

500

What is the term for a fake charging station that steals data from your device?

 Juice Jacking.

500

What is the term for phishing via text messages?

Smishing.

500

What is the recommended minimum length for a secure password?

At least 8-12 characters.

500

What is the shortcut to open Task Manager in Windows?

 Ctrl + Shift + Esc

M
e
n
u