Basic Cybersecurity Terminology
Password Security
Social Engineering
Internet Safety
Phishing Attacks
100

This acronym stands for Virtual Private Network.

What is VPN?


100

Characteristics like length, complexity, and uniqueness contribute to a strong one of these.

What is a password?

100

This manipulation tactic tricks individuals into giving out confidential information.

What is social engineering?

100

Staying cautious of suspicious links and websites is a tip for safe this.

What is safe browsing on the internet?

100

This deceptive practice attempts to steal sensitive information.

What is phishing?

200

It is a barrier between your network and potential threats.

What is a firewall?

200

Using "password" or "123456" makes you vulnerable to attacks due to the use of common ones.

What are common passwords?

200

A common example of this attack is Email solicitation.

What is phishing?

200

The secure version of a website starts with this prefix.

What is HTTPS?

200

Typos, urgent requests, and unfamiliar senders are common signs of this email scam.

What are signs of a phishing email?

300

This term refers to malicious software.

What is malware?

300

This tool securely stores your passwords for multiple accounts.

What is a password manager?

300

Being cautious with sharing personal information is one way to prevent these attacks.

What are social engineering attacks?

300

Keeping your data scrambled during transmission is made possible through this.

What is data encryption?

300

Misspellings, generic greetings, and mismatched URLs can indicate this type of site.

What is a phishing website?

400

This software helps protect your device from viruses and other threats.

What is antivirus software?

400

This process converts your password into a jumbled code.

What is password hashing?

400

Creating a false narrative to obtain information is called this.

What is pretexting?

400

A secure website is often denoted by a padlock symbol and this color in the address bar.

What is green?

400

If you suspect falling victim to this attack, you should report it and change your credentials.

What is a phishing attack?

500

This security method requires two forms of identification for access.

What is two-factor authentication?

500

Adding random characters to passwords is known as this.

What is password salting?

500

Excessive sharing on social media can lead to vulnerabilities.

Why is it risky to share personal information on social media?

500

Clearing this can help protect your privacy and improve browsing speed.

What are browser cache and cookies?

500

Educating employees on this type of scam can mitigate potential risks in organizations.

What is phishing awareness?

M
e
n
u