Cybersecurity MIX
Password security
Cyber Attacks
Data Privacy
100

What does "cybersecurity" mean?

Cybersecurity is the practice of protecting systems, networks, and data from digital attacks.

100

What is the purpose of using a password?

A password helps protect your account by verifying your identity. (preventing unauthorized access)

100

Which website URL is legitimate?a.https://www.payapl.com b.http://www.paypay.com.home/ c.https://www.pay.pal.com d.https://www.paypal.com/us/home

Option D

Option A spells Paypal incorrectly.
Option B spells paypal as paypay
Option C spells Paypal as Pay.pal

100

What is a privacy policy?

A document to inform users about how their personal data will be collected, used, and protected.

200

Name two examples of cybersecurity threats.

Any 2 of:

 - Phishing

 - Malware (Spyware, Ransomeware, Trojan Horses, Viruses, etc.)

 - Distributed Denial of Service (DDOS)

 - SQL injection

 - DNS cache poisoning/tunneling

 - Pharming

Or any other correct answers.

200

Which of the following would be the best password (pswd within square brackets):
a. [Summ3r2017] b.[t3chnologyRulz] c.[12345678] d. [iLm!J@c)&dl^A]

d.[iLm!J@c)&dl^A]. Since it is the only password that uses a combination of letters, numbers and symbols.

200

What does a ransomware ask for in return for giving back a user's data?

A Ransom

200

What does it mean when a website uses HTTPS instead of HTTP?

HTTPS indicates that the website is using a secure protocol to encrypt data transmit data.

300

What does the term firewall refer to?

A. A type of virus that spreads across networks
B. A security device that monitors and controls incoming and outgoing network traffic
C. A program that automatically updates software on your device
D. A method of encrypting sensitive data

B. A firewall monitors and controls incoming and outgoing network traffic to block unauthorized access.

300

What is "two-factor authentication"?

Two-factor authentication (2FA) adds an extra layer of security by requiring two forms of verification, like a password and a code sent to your phone.

300

Which of the following is the safest action if you receive an unexpected email with an attachment from an unknown sender? 

A. Open the attachment to see if it’s important
B. Reply to the email asking for more information
C. Delete the email without opening it
D. Forward the email to a friend to check it out

Option C is correct.
Option A could result in a malicious software.

Option B informs a potential attacker that your email is active and can be attacked further.

Option D unnecessarily puts others at risk, and possibly spreads a malware.

300

Explain any one way to protect your online privacy when using public Wi-Fi.

Use a Virtual Private Network (VPN) or avoid accessing sensitive accounts or information over public Wi-Fi.


Or any other valid answers

400

What differentiates a virus from other malware?

A. It requires user action to replicate and spread to other systems.
B. It can operate independently without any user interaction.
C. It encrypts files and demands ransom for decryption.
D. It primarily targets network infrastructure rather than individual devices.


A. It requires user action to replicate and spread to other systems.

400

Name 4 practices that make a password strong.

Any of the following 4:

 - Mix of letters, numbers and symbols.

 - Avoid common words or personal information.

 - At least 12 letters or longer. (Recommended by microsoft)

 - Different from your previous passwords or passwords on other accounts.

 - Not a word that can be found in a dictionary or the name of a person, character, product or organisation.

Or any other valid options.

400

What is phishing?

Phishing is a cyber attack where an attacker pretends to be a trusted entity to trick individuals into revealing sensitive information.

400

What is a cookie?

A cookie is a small piece of data stored on a user’s computer by a web browser that helps remember user preferences or track behavior.

500

Explain what a "zero-day exploit" is.

As can be derived from the name, a zero-day exploit takes advantage of a software vulnerability that is unknown to the developers, leaving no time for a fix. 

500

What is "password encryption," and why do you think it is used?

Password encryption converts a password into a random string of characters. This means any data breached by a hacker will be non-sensical, so user/organisation data is protected.

500

What is a "Distributed Denial of Service (DDOS)" attack?

A DDoS attack seeks to deny a user access to an IP by overwhelming a server or network by flooding it with traffic, causing it to slow down or crash.

500

What are the 2 ways in which VPN's protect both the users and their data?

1. Masking their IP Address

2. Encrypting all data that is transmitted between the users.