What does the “C” in CIA triad stand for?
Confidentiality
What type of malware encrypts files and demands payment?
Ransomware
What is the ethical response to witnessing cyberbullying?
Report it to a trusted adult or platform
What does MFA stand for?
Multi-Factor Authentication
What tactic involves sending fake emails to trick users?
Phishing
What is the practice of protecting digital systems from threats?
Cybersecurity
What malware spreads without user action?
Worm
What is the term for asking permission before sharing someone’s content?
Consent
What makes a password strong?
Length, complexity, unpredictability (Upper Lower Number Special Length)
What tactic involves pretending to be someone trustworthy?
Pretexting
What does the “A” in CIA triad stand for?
Availability
What malware disguises itself as legitimate software?
Trojan Horse
What is the long-term record of your online actions called?
Digital Footprint
What tool stores and manages secure passwords?
Password Manager
What tactic involves leaving a tempting item like a USB in public?
Baiting
What is a weakness that can be exploited by a threat?
Vulnerability
What attack floods a server with traffic to make it crash?
Denial-of-Service (DoS)
What behavior involves repeatedly harming someone online?
Cyberbullying
What type of authentication uses a fingerprint?
Biometric
What tactic involves following someone into a secure area?
Tailgating
What is the term for the likelihood of harm from a threat exploiting a vulnerability?
Risk
What malware secretly records keystrokes?
Spyware
What is the responsible action after posting something harmful?
Remove it, apologize, and report if needed
What attack tries every possible password combination?
Brute Force Attack
What tactic involves impersonating IT support to get a password?
Social Engineering/Impersonation