Types of malware
Network security
Phishing
Authentication methods
Encryption basics
100

What is scareware?

 Tip: Scareware "scares" you into clicking. Always double-check before paying for virus removal!

This type of malware is designed to trick you into thinking your computer has a virus so you'll pay for fake antivirus software.

🧠 Explanation: Scareware tricks users into thinking their computer is at risk, often through fake pop-up warnings, urging them to buy unnecessary or non-existent software to fix the problem. It's a form of deception aimed at making quick profits.

100

What do we call a secret word or phrase used to protect access to a network or device?

Password

🧠 Explanation: A password is a basic security measure that prevents unauthorized access to systems and accounts. It’s typically something only the user should know.

100

What is the term for a fake email that tries to trick you into giving away personal information like passwords or credit card numbers?

Phishing

🧠 Explanation: Phishing emails pretend to be from trusted sources (like banks or tech companies) to trick you into clicking links or entering sensitive information. Always double-check email addresses and links before clicking.

100

What is the most common method of authentication, where users type in a secret word or phrase?

Password

🧠 Explanation: A password is the most basic and widely used form of authentication. It's something you know, but it's also the easiest to guess or steal if it's weak or reused.

100

What is the process of converting readable data into a coded form to keep it secure?

Encryption

🧠 Explanation: Encryption turns regular information into unreadable code so that only authorized users can decode it. It protects data from being seen or stolen during transmission or storage.

200

What is ransomware?

This malware locks your files and demands money to unlock them.

🧠 Explanation: Ransomware encrypts or locks a victim's files, rendering them inaccessible. The attacker then demands a ransom, usually in cryptocurrency, in exchange for restoring access to the files. Regular backups can help prevent the worst effects of such attacks.

200

What is the name of the security system that acts like a gatekeeper, blocking unauthorized access to or from a network?

Firewall

🧠 Explanation: A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts like a barrier between a trusted network and untrusted ones, helping to block malicious traffic.

200

This type of phishing targets specific individuals or organizations with personalized messages.

Spear phishing

🧠 Explanation: Spear phishing is more targeted than regular phishing. The attacker researches their victim and crafts a realistic, personalized message—often using names, roles, or company details—to increase the chances of success.

200

What method adds a second layer of security by asking for a code sent to your phone or email?

2FA

🧠 Explanation: 2FA requires something you know (like a password) and something you have (like a phone or code), making it much harder for attackers to access your account even if they steal your password.

200

What is the name for the original, readable information before it’s encrypted?

Plaintext

🧠 Explanation: Plaintext is the raw data or message before it's encrypted. Once encrypted, it becomes ciphertext and can’t be understood without the right key.

300

This type of malware is designed to scare you into thinking your computer is infected so you’ll pay for fake antivirus software.

Scareware

🧠 Explanation: Trojan horses disguise themselves as legitimate software or files. Once downloaded or opened, they grant hackers access to the system, allowing them to steal data, install other malicious software, or cause damage.

300

What is the term for converting data into a secret code so only authorized people can read it?

Encryption

🧠 Explanation: Encryption transforms data into an unreadable format, which can only be converted back to its original form by someone who has the correct decryption key. This ensures that sensitive information remains secure during transmission.

300

What’s the name for a fake website designed to look like a real one in order to steal your login info?

Phishing site

🧠 Explanation: A phishing site mimics the design and URL of a real site (like a bank login page) to trick users into entering their information. Always check the website URL carefully—sometimes only one letter is different.

300

What type of authentication uses things like fingerprints, face scans, or voice recognition?

Biometric authentication

🧠 Explanation: Biometric authentication is based on something you are, such as physical traits. It’s unique to each person and hard to replicate, which makes it very secure.

300

What do you call the coded result of encryption that only authorized users can decode?

Ciphertext

🧠 Explanation: Ciphertext is the unreadable version of the data after encryption. It’s only useful to someone who has the correct decryption key or method.


400

What is a worm?

This type of malware spreads by itself through networks and doesn’t need to be clicked or opened to infect systems.


🧠 Explanation: A worm is a self-replicating malware that spreads automatically across networks without needing user intervention (like opening a file). It often exploits vulnerabilities in software to propagate and can cause widespread damage by overwhelming network resources.

400

What kind of attack floods a network or server with so much traffic that it can’t function properly?

DDoS attack (Distributed Denial of Service)

🧠 Explanation: In a DDoS attack, multiple systems are used to flood a network or server with a large volume of traffic, overwhelming the system and causing it to become slow or completely unavailable to users.


400

What’s the term for a phone call where someone pretends to be tech support or a bank representative to steal your info?

Vishing

🧠 Explanation: Vishing uses phone calls instead of emails to deceive you. Scammers may act like a company rep and ask for your credentials or push you to install malicious software “for your safety.”


400

What do we call the process of using a physical device, like a USB key or smart card, to log in securely?

Hardware token

🧠 Explanation: A hardware token is something you have—a physical device that generates or stores login credentials. It’s often used in corporate or high-security settings.

400

What type of encryption uses the same key for both encrypting and decrypting data?

Symmetric encryption🧠 Explanation: In symmetric encryption, the same key is used to lock (encrypt) and unlock (decrypt) data. It's fast but requires secure key sharing between the sender and receiver.


500

This malware secretly gathers your private information like passwords, browsing habits, or keystrokes.

Spyware

🧠 Explanation: Spyware runs in the background of your device, secretly tracking your activity without your consent. It collects sensitive information such as passwords, browsing habits, and keystrokes, which is often sold to third parties or used for malicious purposes.

500

What do we call a fake Wi-Fi network set up to steal users’ data when they connect?

Evil twin attack

🧠 Explanation: An evil twin attack occurs when a hacker sets up a fake Wi-Fi hotspot with the same name as a legitimate network, tricking users into connecting to it. Once connected, the hacker can monitor or steal personal data from the user’s device.

500

What kind of phishing uses text messages to trick people into clicking malicious links or sharing private data?

Smishing 

🧠 Explanation: Smishingis phishing through SMS. Messages might pretend to be from your bank, a delivery service, or even government agencies, with urgent language pushing you to click a link or reply with sensitive information.

500

What authentication method evaluates things like typing speed, location, or the device you’re using to verify your identity?

Behavioral authentication 

🧠 Explanation: Behavioral authentication looks at patterns in how you interact with devices—like how you type or move your mouse. It's a passive method that helps detect unusual behavior and prevent fraud.

500

What type of encryption uses one key to encrypt and a different key to decrypt?

Asymmetric encryption

🧠 Explanation: Asymmetric encryption uses a pair of keys—a public key to encrypt and a private key to decrypt. This method is widely used for secure email, websites (HTTPS), and digital signatures.