Theme 1: Digital Security Basics. Computer Protection and Maintenance.
Theme 2: Types of Password Attacks.
Theme 3: Password Security, Authentication.
Theme 4: Types of Malware.
100

What type of software helps protect a computer from malware?

antivirus software and anti-malware software

100

What is a “brute force” attack?

A brute force attack is a hacking method that relies on trial and error to crack passwords, login credentials, and encryption keys.

100

What characteristics make a password strong?

A strong password is essential for safeguarding your online accounts. It should have the following characteristics:

  1. Length: Use at least 12 characters.
  2. Variety: Combine uppercase and lowercase letters, numbers, and special characters.
  3. Uniqueness: Ensure each account has a unique password
100

What is a virus?

A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be “infected” with a computer virus, a metaphor derived from biological viruses.

200

Find the odd one out:

Protective: 

Erase, Copy, Password, Shield, Censor, Malicious, Defense, Detect, Protect, InfoSec, Malware, Countermeasures

Protective: 

Password, Shield, Censor, Defense, Detect, Protect, InfoSec, Countermeasures

200

What is a “phishing” attack?

This tactic includes deceptive emails to steal information.

200

What authentication methods help enhance security?

To enhance security, consider implementing the following authentication methods:

  1. Two-Factor Authentication (2FA): This adds an extra layer of security by requiring a second form of verification, such as a text message code or a biometric scan.
  2. Passwordless Login: With this method, users can log in without using a traditional username and password. Instead, they might use biometrics or receive a secure link via email.
  3. Multi-factor Authentication (MFA): MFA combines multiple authentication factors (e.g., something you know, something you have, something you are) to strengthen security.
  4. Token-Based Authentication: Tokens are used to verify a user’s identity. They can be short-lived and provide an additional layer of security.
200

How does a Trojan differ from a worm?

A worm is a self-replicating program that spreads across networks without user intervention, while a Trojan disguises itself as legitimate software but contains malicious functions that can harm a computer or steal information. In summary:

  • Worm: Spreads autonomously, exploiting system weaknesses.
  • Trojan: Masquerades as useful software but harbors hidden malicious intent.
300

What is a backup, and why is it important for data security?

Backups are important because they allow the restoring of files and data that are lost or stolen

300

Do you think your password is easy to hack, Why?

Password thieves can easily find your password if you write it down on a yellow sticky note hidden under your keyboard or in plain sight on top of your monitor. If a hacker doesn’t have physical access to your work area, but your computer is connected to a network, your password can be discovered by hacker using a remote computer and software tools that systematically guess your password, intercept it, or trick you into revealing it.
The brute force attack uses password-cracking software but its range is much more extensive than the dictionary attack. Because it exhausts all possible
combinations of letters to decrypt a password, a brute force attack can run for days to crack some passwords.

300

What is “biometric authentication”?

Biometric authentication is a security process that compares an individual’s physical or behavioral characteristics to stored biometric data. By analyzing unique identifiers like fingerprints, facial features, voice, or typing patterns, biometrics grants access to buildings, applications, and systems. It has become a trustworthy method for verifying identity in an era of increasing cybercrime and identity theft.

300

Which types of malware can encrypt your files? What consequences can this lead to?

Ransomware is a type of malware that uses encryption to disable a target’s access to its data until a ransom is paid.

400

What steps would you take to secure your computer against viruses and hackers?

1) Use an antivirus
2) Use only licensed software
3) Do not reply to questionable emails
4) Do not open questionable sites and suspicious links

400

How you can protect yourself from vishing?

1) Be cautious about all communications you receive. If it appears to be a suspicious one, do not respond. Delete it.

2) Don’t pick up the phone, simply let it go to voicemail. Caller IDs can be faked, which means you might not know who’s calling. Later decide whether to call back.

3) Don’t press buttons or respond to prompts. Scammers often use these tricks to identify potential targets for more robocalls. And the record of your voice can be used to navigate voice-automated phone menus.

4) Hang up. The moment you suspect it’s a fraudulent phone call, don’t feel obliged to carry on a polite conversation. Simply hang up and block the number.

5) Verify the caller’s identity. If the person provides a call-back number, it may be part of the scam, so don’t use it.

400

How does a password manager work and why is it needed?

A password manager is a program that helps you create, store, and manage passwords. You use one master password to enter all your other passwords into a single program, eliminating the need to remember them all. Password managers enhance security by encrypting your passwords, ensuring only you have access to them, and they also generate complex passwords for your accounts.

400

What is “adware”?

Adware is a type of malicious software that secretly installs itself on your device and displays unwanted advertisements and pop-ups. It can even track your online behavior and show personalized ads.

M
e
n
u