1. Online Safety
2. Common Cyber Threats
3. Malware Prevention
4. Data Encryption
5. Network Security
100

What does the term "phishing" refer to?

A type of cyber-attack where attackers attempt to trick users into revealing personal information by pretending to be a legitimate entity.

100

What is malware?

Malicious software designed to damage, disrupt, or gain unauthorized access to systems.

100

What is the first thing you should do if you suspect your computer is infected with malware?


Run a malware scan using trusted antivirus software.

100

What is encryption?

The process of converting data into a code to prevent unauthorized access.

100

What is a router, and why is it important for network security?

A router connects devices to the internet and helps manage data traffic; it should have strong security settings to protect against unauthorized access.

200

What should you do if you receive an email from an unknown sender asking for sensitive information?

Do not respond, and report the email as phishing or spam.

200

What is the difference between a virus and a worm?

A virus attaches itself to a program or file, while a worm is a self-replicating program that spreads without needing a host.

200

How can updating software prevent malware infections?

Updates patch security vulnerabilities that malware can exploit

200

What is SSL/TLS encryption commonly used for?

To secure online communications, especially in transactions and login forms.

200

What is Wi-Fi encryption?

The use of encryption protocols (like WPA2) to secure wireless internet connections from unauthorized access.

300

What is the purpose of two-factor authentication (2FA)?


It adds an extra layer of security by requiring a second form of verification, such as a text message or authentication app.

300

What is a ransomware attack?

A type of malware that encrypts files on a victim's computer and demands payment for decryption

300

What is a firewall?


A security system that monitors and controls incoming and outgoing network traffic, helping block unauthorized access

300

What is end-to-end encryption in messaging apps?

It ensures that only the sender and recipient can read the messages, preventing interception by third parties

300

What is the purpose of a Virtual Local Area Network (VLAN)?


It segments network traffic to improve security and manageability within large organizations.

400

How can you protect your devices from unauthorized access?

Use strong, unique passwords and enable screen locks.

400

What is a DDoS (Distributed Denial of Service) attack?

An attack that overwhelms a system with traffic, causing it to crash or become unavailable.

400

Why should you avoid downloading software from untrustworthy sources?

It could contain malware or other harmful programs.

400

What is the main purpose of encrypting sensitive data?

To protect the confidentiality of the data, especially during storage and transmission.

400

What does a security patch do?

It fixes vulnerabilities in software that could be exploited by attackers.

500

What is a VPN and why should you use one?

  • A Virtual Private Network (VPN) encrypts your internet connection, ensuring secure, anonymous browsing, especially on public networks.
500

What is a botnet?

A network of compromised computers or devices controlled by a cybercriminal to carry out malicious activities.

500

What is the role of an antivirus program in preventing malware?

It detects, quarantines, and removes malware from your computer.

500

How can businesses use encryption to protect customer data?

By encrypting sensitive information such as credit card details or personal identifiers in their databases

500

What is the role of a network intrusion detection system (NIDS)?

To monitor network traffic for suspicious activity and alert administrators about potential security breaches.