Category A
Category B
Category C
Category D
Category E
100

I’m the first line of defense against online threats. I block unwanted visitors and keep your network safe. What am I?

Firewall

100

What does "IP" stand for?

Internet Protocol

100

What does "Wi-Fi" stand for?

Wireless Fidelity

100

Clicking on unknown links is a good practice. True or False?

False

100

Public Wi-Fi networks are safe for accessing sensitive information.True or False?

False

200

i am a security code that allows access to a computer or a specific program.

Password or Passcode

200

I am a type of attack, i lock your files until a ransom is paid. 

Ransomware

200

I'm a security measure that requires users to provide two or more forms of identification to access a system.

Two Factor Authentication (2FA) or Multi Factor Authentication (MFA)
200

What is the term for unauthorized access to computer systems?

Hacking

200

To prevent data loss in case of hardware failure, cyber attacks, or accidental deletion, one should normalize

Regular Backups

300

i am a type of software that is designed to detect and remove viruses. What am i?

Antivirus

300

Information you leave about yourself online through postings, photographs, and videos can create?

Virtual Footprint

300

I am a short-ranged wireless protocol for exchanging data

Bluetooth

300

i am a weakness or flaw in a system that can be exploited by attackers. 

Vulnerability

300

What does "VPN" stand for

Virtual Private Network

400

I'm the process of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.

Cybersecurity

400

I help you to direct traffic between different networks. 

Router

400

I help you manage and store your passwords securely.

Password Managers

400

I am a malicious software designed to harm, exploit, or otherwise compromise computer systems. 

Malware

400

Applying updates to software to fix vulnerabilities and improve security is called?

Patching

500

I'm a technique used to protect data by converting it into a code that is unintelligible to anyone who does not have the decryption key.

Encryption

500

I'm a type of malware that replicates itself and spreads to other computers without the user's knowledge or consent.

Worm

500

i am a malicious software that enters a computer and tracks and gathers personal information. What am i?

Spyware

500

I help you encrypt your internet connection and hide your IP address, providing privacy and security online. 

VPN

500

Suspicious links, spelling mistakes, and urgent messages prompting immediate action, are related to what concept in cybersecurity

Phishing email