Clicking unknown links in suspicious emails is known as what?
Phishing
True or False: “123456” is a secure password.
False
A harmful program disguised as legitimate software is called a _____
Trojan
True or False: It’s okay to share another person’s photo online without permission.
False
What does “Accept Cookies” allow?
Saving user data for website features & tracking
What’s a common sign of a phishing scam in an email?
Bad spelling/urgent threats/personal info
What type of password is considered strong?
A mix of uppercase, lowercase, numbers, symbols
Malware that locks your files and demands payment is called what?
Ransomware
Ethical digital behavior includes what?
Respect/honesty/privacy awareness
What type of data is personally identifiable?
Name/ID number/email/address
If a message says “Your account will be closed unless you act now,” what should you do?
Ignore and verify through official source
What is Two-Factor Authentication (2FA)?
A second verification step when logging in
A DDoS attack targets what?
A network/service/server to overload and shut it down
If you accidentally receive confidential data, what should you do?
Do not share it/notify the sender
Why should you limit app permissions?
Apps may misuse/steal your data
Phishing often asks you to provide what sensitive information?
Passwords/banking info/personal data
Should you reuse the same password across different accounts?
No
A virus needs what to spread?
Host file/Program
Why is cyberbullying harmful?
Causes emotional and psychological damage
What is encryption?
Securing data so only authorized parties can access it
What is “spear-phishing”?
Targeted phishing aimed at a specific person or organization
What is a password manager used for?
Securely storing and generating passwords
What is the difference between a worm and a virus?
Worm spreads independently; virus requires a host
What is digital citizenship?
Responsible and ethical participation online
What is GDPR or similar privacy legislation meant to do?
Protect user data and privacy rights