Online safety
Common Threats
Best Practice
Decipher This
100

To protect your computer from viruses and malware.

What is the purpose of anti-virus software?

100


A common cybersecurity threat that involves tricking individuals into providing sensitive information, such as passwords or personal details.

What is phishing?

100

 Use a combination of letters, numbers, and symbols

What should you do to create a strong password?

100

SOC

What is Security Operations Center?

200

There is a padlock symbol next to the website address.

What is a sign of a secure website?


200


Encrypts files and demands payment for decryption

What is ransomware ?

200

Accessing your online banking.

What is an unsafe practice when using public Wi-Fi?

200

ZTNA

What is Zero Trust Network Access?

300

You should never share this with others.

What is your password?

300

A cybersecurity threat involves attackers attempting to guess passwords or access codes to gain unauthorized entry to systems.

What is a brute force attack?

300

It requires a password and a verification code.

What is two-factor authentication?

300

FEW

What is Federally Employed Women? 

400

Keeping this on your router makes it much easier for hackers to access your network?

What is the manufacturer default password?

400

A cybersecurity threat is designed to monitor and transmit sensitive information to unauthorized individuals.

What is spyware?

400

It is used to block unauthorized access to a network

What is a firewall ?

400

NIST

What is the National Institutes of Standards and Technology?

500

What should you do if you receive a suspicious email asking for your bank account details?

What is report the email as phishing and do not provide any personal information

500

A software program specifically designed to disrupt, damage, or gain unauthorized access to computer systems

What is a virus?

500

It may appear to be a useful tool, such as a game, utility, or downloadable file, but it is actually designed to give the attacker remote control over the infected computer.

What is a Trojan Horse?

500

CIRT

What is Computer Incident Response Team?


M
e
n
u