This type of malicious software is designed to harm or gain unauthorized access to your computer.
What is malware?
This software helps detect and remove viruses from your computer.
What is antivirus software?
You should never click on suspicious links in an email because it could be…
What is phishing?
This TV show features a cybersecurity engineer who hacks evil corporations and fights corruption.
What is Mr. Robot?
You get a friend request on social media from someone you don’t know. What’s the safest action?
What is ignore or decline the request?
The process of converting readable data into unreadable text to protect is called…
What is encryption?
A tool that hides your IP address and encrypts your internet connection is a…
What is a VPN (Virtual Private Network)?
Websites that start with this indicate that they encrypt your data for safety.
What is HTTPS?
In the movie The Matrix, the hacker protagonist is known by this alias.
Who is Neo?
You receive an email from your “bank” asking for your PIN. What should you do?
What is do not reply; verify directly with the bank?
A security system that monitors and controls incoming and outgoing network traffic is called a…
What is a firewall?
This open-source operating system is commonly used for cybersecurity testing.
What is Kali Linux?
Using the same password across multiple sites is risky because it can…
What makes all accounts vulnerable if one is hacked?
This animated series features a cyberpunk world where hackers are central to the story, blending virtual and real-life hacking.
What is Cyberpunk: Edgerunners?
Your phone pops up with a message saying “You’ve won a prize! Click here to claim it.” What is this likely?
What is a phishing scam?
A type of malware that locks your files and demands payment to get them back is called…
What is ransomware?
This tool helps you securely store and manage all your passwords.
What is a password manager?
A small file stored in your browser to track activity, sometimes used for ads, is called a...
What is a cookie?
The TV show Person of Interest features a supercomputer that predicts crime. What type of system is it?
What is AI surveillance / predictive analytics?
A website asks you to create a password using only letters characters. Why is this unsafe?
What is strong passwords should use letters, numbers, and symbols?
Software that secretly records your keystrokes to steal sensitive information is called…
What is a keylogger?
This type of tool captures and inspects network traffic for analysis purposes.
What is a packet sniffer or Wireshark?
This text file contains millions of common passwords and is often used by security professionals and hackers for password-cracking exercises.
What is rockyou.txt?
This famous hacker collective has been involved in political hacktivis.
Who is Anonymous?
You get a call from someone claiming to be IT support, asking for your login information. This is an example of…
What is social engineering?