The Internet
Personal, System, Network Security
Passwords
Social Media and Accounts
Your Computer / Mobile Device
100

This was developed back in the 1960s by the US Department of Defense and is now the largest global system of interconnected computer networks. 

The Internet

100

When should you provide personal information to a person or company that doesn't need to know it.

NEVER

100

The minimum recommended character count for a password or passphrase.

14+

100

This social media giant is the largest and was founded by Mark Zuckerberg. 

Facebook

100

A computer program used to prevent, detect, and remove computer viruses and malware.

Antivirus or antimalware software

200

WWW

World Wide Web

200

By connecting to your personal ____________, if available, is much safer than connecting to a guest WiFi network such as a coffee shop, airport, or hotel.

Cell phone or hot spot

200

A sentence or "phrase" that is used for a password.

Passphrase

200

An American microblogging and social networking service on which users post and interact with messages known as "Tweets".

Twitter

200

By restoring a ______________ is the easiest and single best way to recover from a ransomware attack that encrypted all your personal data

Backup

300

A computer or mobile device is more likely to be compromised (hacked) when connected to a ___________. 

Network

300

You just found out that you were victim of an online scam, it is in your best interest to contact your local _______________ and then report it to the company that may be involved. 

law enforcement agency (Police or Sheriff)

300

A type of service or platform that securely stores all your passwords and sensitive information in one place.

Password vault or Password Manager

300

Posting on social media that you are going on a vacation or trip is a sure way to have your home _____________. 

Vandalized or broken into

300

By performing this function, you ensure that your personal data will no longer be on the device before you trade-in or recycle.

Restore to factory defaults or wiping 

400

A person who is usually an expert with technical knowledge that maliciously infiltrates a computer to steal data.  

A Hacker
400

Everyone leaves a digital footprint. It is recommended to have this plan along side your will so your loved ones know what to do with you data and accounts when you pass away.

Digital Inheritance Plan

400

What should you never do with a password that is already used or especially compromised?

Reuse it or recycle it

400

You should _____________ an online account if you no longer use it or it's been inactive for many years.

close or delete

400

By performing regular _______________ with your computer/mobile device, you are protecting your device's Operating System and applications from being exploited.

Software updates or patching 

500

This famous Internet company started in 1989 that provided basic Internet Access and coined the phrase "You Got Mail".

AOL (America Online)

500

Which wireless (WiFi) network RF (Radio Frequency) would be best used when wanting to access your network/Internet from far distances, like your back yard, but may not be as fast?

2.4GHz

500

These three types of characters should be used to make up a password's complexity which creates a strong password.

Letters, Number, and Special Characters 

500

By adjusting your ______________ settings, you can help protect who views your personal content on all social media platforms. 

privacy or security

500

The second best thing to a strong password is to enable what?

MFA (Multi-factor Authentication) or 2 Factor Authentication

M
e
n
u