Passwords & Authentication
Phishing & Social Engineering
Malware & Threats
Viruses
Cyber Hygiene
100

This method uses two different forms of identity to verify a user.

Multi-factor Authentication 

100

You receive an email asking you to verify your bank account. What should you do?

Report it as phishing and don’t click the link! 

100

This type of malware locks your files and demands payment.

Ransomware

100

What is a computer virus?

What is a program that replicates itself by attaching to other files and spreads when those files are shared?

100

Why is it important to lock your computer when stepping away from your desk?

What is to prevent unauthorized access to your data and systems?

200

True or False: It’s safe to reuse a strong password across multiple websites.

 FALSE

200

This type of attack involves impersonating a trusted individual to gain access.

Spear phishing

200

This malware replicates itself and spreads to other systems without user interaction.

What is a worm

200

True or False: A virus can spread without any user interaction.

What is False? (That’s typically a worm, not a virus.)

200

This is a tool that stores and generates strong passwords.

What is a password manager?

300

What is the main benefit of using a password manager?

What is securely storing and generating strong, unique passwords for each account?

300

This type of phishing uses SMS messages to trick users.

Smishing

300

This type of malware disguises itself as legitimate software to trick users into installing it.

What is a Trojan horse?

300

This type of virus activates only when certain conditions are met, like a specific date or action.

What is a logic bomb?

300

True or False: Public Wi-Fi is always safe to use if it doesn’t require a password.

What is False?

400

How often should you change your passwords?

What is every 3–6 months or immediately after a breach?

400

An attacker creates a fake website that looks like your bank’s login page.

website spoofing or pharming



400

A program that records every keystroke you make.

Keylogger


400

What’s the main difference between a virus and a worm?

What is a virus needs a host file to spread, while a worm can self-replicate and spread independently?

400

You should update your software regularly to fix these.

Security Vulnerabilites

500

What is two-factor authentication (2FA), and why is it important?

What is an extra layer of security that requires a second form of verification, like a code sent to your phone?

500

This tactic involves impersonating a trusted contact using a spoofed email address to request sensitive data.

Business Email Compromise (BEC)

500

This type of malware gives attackers remote control over an infected system.

What is a Remote Access Trojan (RAT)

500

What’s the best way to prevent virus infections on your computer?


What is using updated antivirus software, avoiding suspicious downloads, and keeping your system patched?

500

This type of software helps detect and block malicious programs.

What is antivirus or anti-malware software?