What does "malware" stand for?
What is Malicious software?
What do we call the unique string of characters that identifies your device on the internet?
What is an IP address?
What is the recommended minimum length for a strong password?
What is at least 12 characters?
What should you avoid sharing publicly on social media to protect your privacy?
What is personal details like your home address, phone number and location.
What can an antivirus software protect your computer from?
What is a malware?
Name a type of malware that holds your files hostage and demands payment.
What is ransomware?
What's a good way to protect your browsing privacy online?
What is use a VPN?
What's a good way to create strong passwords easily?
What is use a password manager?
An attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email.
What is phishing?
What should you do if you receive a suspicious email with a link?
Do not click the link and report it as phishing.
Which type of malware replicates itself to spread to other computers, without human intervention?
What is a worm?
Websites can track your activities through them.
What are cookies?
True or False: It is safe to reuse the same password for multiple accounts.
What is false.
* * * DOUBLE JEOPARY!!! * * * Linked In or Facebook are channels that are often used for this targeted attack on specific individuals, or organizations which seeks unauthorized access to confidential data.
What is spear phishing?
What is the purpose of a firewall?
To block unauthorized access to or from a private network.
What kind of malware secretly monitors your actions and can steal your personal information?
Who is a spyware?
Which web browser mode is best for protecting your privacy from storing browsing history?
What is Incognito or Private mode?
What is two-factor authentication (2FA)?
What is a security process where you provide two pieces of information to verify your identity?
What is "phishing" and how can it occur on social media?
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity, often through fake messages or links on social media.
What is the best practice for keeping your software and devices secure?
Regularly update your software and devices to ensure security patches are applied.
What is the name of malware that appears to be a legitimate program but contains harmful code?
What is a Trojan Hoarse?
What is the best method to prevent third parties from accessing your personal data on public Wi-Fi?
What is using a VPN?
Give one example of a secure method of storing passwords.
What is a password manager?
What can you do if someone is impersonating you on social media?
Report the account to the social media platform and ask them to take it down.
Name one method to secure a mobile device against cyber threats.
Use a strong passcode, fingerprint or facial recognition to lock the device.