What is phishing?
This threat tricks users into clicking fake links or entering passwords on fake websites.
What is a worm?
This malware spreads itself without needing a host file or user interaction.
What is antivirus software?
This tool scans and removes malicious software from your computer.
What is a weak password?
This type of password uses common words and is easy to guess.
What is HTTPS?
This secure protocol is used for safe browsing on websites.
What is ransomware?
This type of malware locks your files and demands payment to restore access.
What is a Trojan horse?
This malware disguises itself as legitimate software.
What is a firewall?
This system blocks unauthorized access to a network.
What is a password manager?
This is a system that stores and generates secure passwords for users.
What is a private network?
This type of network is safer than public Wi-Fi and requires a password.
What is a DDoS attack?
This attack floods a server with traffic to make a website unavailable.
What is a virus?
This malware replicates itself by attaching to other files.
What is patching or updating?
This practice involves regularly updating software to fix vulnerabilities.
What is a brute-force attack?
This attack tries every possible combination to guess a password.
What is a VPN?
This is a secure tunnel used to protect internet traffic.
What is a keylogger?
This malware secretly records everything you type on your keyboard.
What is adware?
This type of malware displays unwanted advertisements.
What is two-factor authentication (2FA)?
This adds an extra layer of security by requiring two forms of verification.
What is a dictionary attack or social engineering password guessing?
This method uses personal information to guess passwords.
What is a man-in-the-middle attack?
This attack intercepts communication between two users.
What is social engineering?
This attack involves manipulating people rather than hacking systems directly.
What is a bot or botnet malware?
This malware allows hackers to remotely control your computer.
What is encryption?
This technique converts data into unreadable format to protect it.
What is biometric authentication?
This authentication method uses fingerprints or face recognition.
What is least privilege?
This principle means giving users only the access they need.