Using a combination of letters, numbers, and symbols
What is the best way to create a strong password?
Social engineering
What is the most common method used by hackers to access a computer system?
Enabling two-factor authentication
What is the best practice to protect your online accounts from being hacked?
A fraudulent attempt to obtain sensitive information
What is phishing?
Ransomware
Which malware encrypts files on a computer and demands a ransom for their release?
Encryption
What is the best practice to protect sensitive information by converting it into a secret code?
Software that prevents unauthorized access to a computer network
What is a firewall?
Trojan horse
What is the malicious program that disguises itself as legitimate software?
Ignoring and deleting suspicious emails
What is the best practice for handling phishing emails?
To detect and remove computer viruses
What is the purpose of anti-virus software?
Phishing
What common cybersecurity threat targets individuals through deceptive emails or websites?
Regularly updating antivirus software
What is the best practice for protecting your computer from malware?
Using a combination of password and another verification method
What is two-factor authentication?
Virus
What malicious program self-replicates and spreads to other computers or networks?
Using a virtual private network (VPN)
What is the best practice for securely browsing the internet?