Basic
Cyber Attacks
Password & Identity Security
Definitions
Safe Practices
100

What Does "VPN" stand for?

Virtual Private Network

100

What is "phishing"?



A cyber attack using fake emails or messages to steal personal information

100

What is the recommended minimum length for a strong password?



12 characters

100

Special software designed to remove malware is known as?

Anti-virus software

100

What should you look for in a website’s URL to know it's secure?



HTTPS

200

What is the purpose of a firewall?

To filter "traffic/data" on a network

200

The unsolicited, unwanted, and often irrelevant digital communication, primarily sent in bulk is known as?

SPAM

200

What tool helps store and manage passwords securely?



Password Manager

200

A honeypot is known as?

A trap set to catch an attacker

200

Why should you avoid public Wi-Fi without a VPN?



Public Wi-Fi can be unsecured

300

Which type of malware disguises itself as legitimate software?



Trojan

300

What is a "man-in-the-middle" attack?



An attack where the hacker intercepts communication between two parties

300

When you use the same password for multiple accounts, this is known as?



Password reuse/redundacy



300

What does the CIA triad stand for?

Confidentiality, Availability, Integrity

300

What should you do when leaving your device unattended?

Screen lock it 

400

What does "2FA" stand for in cybersecurity?



2 factor Authentication

400

What type of malware locks your files and demands payment?



Ransomware

400

What type of attack involves guessing a password by trying many combinations rapidly?


Brute-force

400

Encryption is: 

The process of making data unreadable to prevent unauthorized access
400

If you are signing up on a site and unsure if it's safe. What should you do?

Leave the site/use a disposal email address or password

500

Which protocol secures data being sent over the web, indicated by a padlock icon in browsers?



HTTPS

500

An attack which attaches itself and spreads, infecting other computers is known as?

Virus

500

What is biometric authentication?



Security verification using physical traits like fingerprint or face recognition



500

Penetration Testing is the art of

Testing computers/systems to validate their security

500

You must never use ---- --------- on multiple sites, regardless of it's convenience. 

Use the same passwords