Malware
Online Privacy
Password Safety
Social Media Safety
General Cybersecurity
100

What does "malware" stand for?

What is Malicious software?

100

What do we call the unique string of characters that identifies your device on the internet?

What is an IP address?

100

What is the recommended minimum length for a strong password?

What is at least 12 characters?

100

What should you avoid sharing publicly on social media to protect your privacy?

What is personal details like your home address, phone number and location.

100

What can an antivirus software protect your computer from?

What is a malware?

200

Name a type of malware that holds your files hostage and demands payment.

What is ransomware?

200

What's a good way to protect your browsing privacy online?

What is use a VPN?

200

What's a good way to create strong passwords easily?

What is use a password manager?

200

An attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email.

What is phishing?

200

What should you do if you receive a suspicious email with a link?

Do not click the link and report it as phishing.

300

Which type of malware replicates itself to spread to other computers, without human intervention?

What is a worm?

300

Websites can track your activities through them.

What are cookies?

300

True or False: It is safe to reuse the same password for multiple accounts.

What is false.

300

* * * DOUBLE JEOPARY!!! * * * Linked In or Facebook are channels that are often used for this targeted attack on specific individuals, or organizations which seeks unauthorized access to confidential data.

What is spear phishing?

300

What is the purpose of a firewall?

To block unauthorized access to or from a private network.

400

What kind of malware secretly monitors your actions and can steal your personal information?

Who is a spyware?

400

Which web browser mode is best for protecting your privacy from storing browsing history?

What is Incognito or Private mode?

400

What is two-factor authentication (2FA)?

What is a security process where you provide two pieces of information to verify your identity?

400

What is "phishing" and how can it occur on social media?

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity, often through fake messages or links on social media.

400

What is the best practice for keeping your software and devices secure?

Regularly update your software and devices to ensure security patches are applied.

500

What is the name of malware that appears to be a legitimate program but contains harmful code?

What is a Trojan Hoarse?

500

What is the best method to prevent third parties from accessing your personal data on public Wi-Fi?

What is using a VPN?

500

Give one example of a secure method of storing passwords.

What is a password manager?

500

What can you do if someone is impersonating you on social media?

Report the account to the social media platform and ask them to take it down.

500

Name one method to secure a mobile device against cyber threats.

Use a strong passcode, fingerprint or facial recognition to lock the device.