Online safety
Common threats
Best practices
100

Using a combination of letters, numbers, and symbols

What is the best way to create a strong password?

100

Social engineering

What is the most common method used by hackers to access a computer system?

100

Enabling two-factor authentication

What is the best practice to protect your online accounts from being hacked?

200

A fraudulent attempt to obtain sensitive information

What is phishing?

200

Ransomware

Which malware encrypts files on a computer and demands a ransom for their release?

200

Encryption

What is the best practice to protect sensitive information by converting it into a secret code?

300

Software that prevents unauthorized access to a computer network

What is a firewall?

300

Trojan horse

What is the malicious program that disguises itself as legitimate software?

300

Ignoring and deleting suspicious emails

What is the best practice for handling phishing emails?

400

To detect and remove computer viruses

What is the purpose of anti-virus software?

400

Phishing

What common cybersecurity threat targets individuals through deceptive emails or websites?

400

Regularly updating antivirus software

What is the best practice for protecting your computer from malware?

500

Using a combination of password and another verification method

What is two-factor authentication?

500

Virus

What malicious program self-replicates and spreads to other computers or networks?

500

Using a virtual private network (VPN)

What is the best practice for securely browsing the internet?