This term refers to the protection of computer systems, networks, and data from theft, damage, or unauthorized access.
What is Cybersecurity?
True or False: A strong password should include upper and lowercase letters, numbers and symbols.
What is True?
True or False: it is best lock your computer whenever you leave it unattended.
What is true?
This type of phishing is a targeted attack.
What is spearphishing?
Software created by hackers with the intention of stealing data and/ or damaging our internal systems is known as.
What is malware?
A secure, private network that you can connect to over the internet.
What is a VPN (Virtual Private Network)?
The term for a tool that securely stores and manages passwords for various accounts.
What is a password manager or vault?
Using barriers, locks, and access control systems to restrict entry to authorized personnel only is a form of ____________ security.
What is physical?
This type of phishing attack uses phone calls or voice messages to deceive individuals into providing sensitive information or performing certain actions.
What is vishing?
This type of malware replicates itself to spread to other computers.
What is a virus or worm?
This common cybersecurity threat involves tricking individuals into disclosing sensitive information or clicking on malicious links through deceptive emails or websites.
What is phishing?
The recommended minimum length for a strong password.
What is 15 characters?
Security method that requires users to provide two or more different forms of verification to gain access to an account or system.
What is Multi-factor authentication (MFA)?
This variant targets high-ranking individuals or executives within an organization, aiming to steal sensitive information or gain unauthorized access to corporate networks.
What is whaling?
This malware type is designed to block access to a computer system until a sum of money is paid.
What is ransomware?
This is the process of converting information or data into a code to prevent unauthorized access.
What is encryption?
Easily guessed or cracked by unauthorized users, often because it is short, uses common words like "password" or predictable sequences like "1234," lacks complexity, or contains personal information.
What is a weak password?
Refrain from sharing personal identifiable information, financial details, passwords, private or confidential information with this learning model.
What is AI (Artificial Intelligence)?
This type of phishing involves a SMS text message.
What is smishing?
An approach to gain access to information through misrepresentation commonly by impersonation.
What is social engineering?
This security measure involves confirming the identity of users or systems before granting access to resources or data, typically through passwords, biometrics, or security tokens.
What is authentication?
This type of authentication method involves using a sequence of words or a sentence as a password, typically longer and more memorable than traditional passwords.
What is a passphrase?
Any information that can be used to identify a specific individual, either directly or indirectly.
What is PII (Personally Identifiable Information)?
This technique uses fraudulent emails that appear to come from a legitimate sender, such as a bank or government agency, to trick recipients into taking action.
What is email spoofing?
Infection of this is typically from email attachments or spoofed websites.
What is malware or ransomware?