What are some common security questions you get asked when making an account?
Mother’s maiden name, first pet’s name, home address.
What does “MFA” stand for?
Multi-Factor-Authentication
What should you do if you receive an unexpected message from someone you don’t know?
Ignore or delete the message, especially if it asks for personal information.
What personal information is often leaked in data breaches?
Email addresses, passwords, or credit card numbers.
What is a computer virus?
A type of malicious software that can replicate itself and spread to other computers, often damaging or stealing data.
What special characters are usually good to use when making a new password? (Choose One)
Special characters like “!@#$%^&*()”
What security tool scans your computer regularly for viruses and malware?
Antivirus/Antimalware software.
What is a safe way to create a secure username?
Avoid using personal information like your real name or birthdate.
What should you do if you find out your information was part of a data leak?
Change your passwords immediately and monitor your accounts for suspicious activity.
What does “malware” stand for?
Malicious software.
What is the minimum recommended length for a strong password?
At least 8-12 characters.
What is the term for keeping your device's operating system and software up to date to fix security vulnerabilities?
Patch management. Or Compliance.
What type of Wi-Fi network should you avoid accessing sensitive information on?
Public or unsecured Wi-Fi networks.
How can you find out if your email address has been compromised in a data breach?
By using a service like "Have I Been Pwned" to check if your email has been involved in a breach.
What is ransomware?
A type of malware that locks your files or device and demands payment to unlock them.
What practice involves using a single password across multiple accounts?
Password reuse, which is not recommended for security reasons.
What is a firewall, and what does it protect you from?
A firewall is a network security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access.
What is the purpose of using HTTPS instead of HTTP when browsing a website?
HTTPS encrypts data sent between you and the website, making it more secure than HTTP.
What is the "dark web" and why is it often associated with stolen data?
The dark web is a part of the internet not accessible by normal search engines, where stolen data is often bought and sold.
What is the difference between a virus and a worm?
A virus requires human action to spread, while a worm can spread automatically across networks without user intervention.
What three factors can a person use to authenticate themselves (Login)? (Choose One)
Something you know. (Password, Security question)
Something you have. (Pager, Smart card)
Something you are. (Retinal Scan, Finger Print)
What does 'sandboxing' mean in device security, and why is it used?
It refers to the practice of isolating devices, or applications and running them in a secure environment.
What is “social engineering” in the context of cybersecurity?
A tactic where attackers manipulate individuals into revealing confidential information or performing actions that compromise security.
(Gift Card)
Which area is the most targeted for data breahes?
1. Healthcare (Correct)
(Incorrect, but the other two)
2. Financial
3. Retail
What is a zero-day attack?
A software vulnerability that is unknown to the software vendor and can be exploited by attackers before a patch is available.