Phishing & Scams
Password Protection
Cyber Threats
Digital Responsibility & Ethics
Data Privacy & Permissions
100

Clicking unknown links in suspicious emails is known as what?

Phishing

100

True or False: “123456” is a secure password.

False

100

A harmful program disguised as legitimate software is called a _____

Trojan

100

True or False: It’s okay to share another person’s photo online without permission.

False

100

What does “Accept Cookies” allow?

Saving user data for website features & tracking

200

What’s a common sign of a phishing scam in an email?

Bad spelling/urgent threats/personal info

200

What type of password is considered strong?

A mix of uppercase, lowercase, numbers, symbols

200

Malware that locks your files and demands payment is called what?

Ransomware 

200

Ethical digital behavior includes what?

Respect/honesty/privacy awareness

200

What type of data is personally identifiable?

 Name/ID number/email/address

300

If a message says “Your account will be closed unless you act now,” what should you do?

Ignore and verify through official source

300

What is Two-Factor Authentication (2FA)?

A second verification step when logging in

300

A DDoS attack targets what?

A network/service/server to overload and shut it down

300

If you accidentally receive confidential data, what should you do?

Do not share it/notify the sender

300

Why should you limit app permissions?

Apps may misuse/steal your data

400

Phishing often asks you to provide what sensitive information?

Passwords/banking info/personal data

400

Should you reuse the same password across different accounts?

No

400

A virus needs what to spread?

Host file/Program

400

Why is cyberbullying harmful?

Causes emotional and psychological damage

400

What is encryption?

Securing data so only authorized parties can access it

500

What is “spear-phishing”?

Targeted phishing aimed at a specific person or organization

500

What is a password manager used for?

Securely storing and generating passwords

500

What is the difference between a worm and a virus?

Worm spreads independently; virus requires a host

500

What is digital citizenship?

Responsible and ethical participation online

500

What is GDPR or similar privacy legislation meant to do?

Protect user data and privacy rights

M
e
n
u