Hack to the Basics
Password? I Hardly Know Her!
Malware, Malware on the Wall
IP, IP, Hooray!
Think Before You Click
100

This term refers to protecting computers, networks, and data from digital attacks.

What is cybersecurity?

100

A strong password should include a mix of these four elements.

What are uppercase letters, lowercase letters, numbers, and symbols?

100

This term describes software designed to damage or gain unauthorized access to systems.

What is malware?

100

This type of address identifies a device on a network.

What is an IP address?

100

Reviewing these settings helps protect your online privacy.

What are privacy settings?

200

The main goal of cybersecurity is to prevent unauthorized access and this type of loss.

What is data loss?

200

Reusing passwords is risky because if one account is hacked, this can happen.

What is multiple accounts being compromised?

200

This type of malware locks files and demands payment.

What is ransomware?

200

This tool helps block unauthorized network traffic.

What is a firewall?

200

If your account is hacked, you should immediately change this.

What is your password?

300

Confidentiality, Integrity, and Availability together form this security model.

What is the CIA Triad?

300

Logging in using more than one verification method is called this.

What is multi-factor authentication?

300

Phishing attacks try to trick users into giving away this kind of information.

What is personal or sensitive information?

300

This protocol is more secure than HTTP because it uses encryption.

What is HTTPS?

300

Repeated online harassment or intimidation is called this.

What is cyberbullying?

400

Keeping data private and accessible only to authorized users is called this.

What is confidentiality?

400

A code sent to your phone is an example of something you have.

What is something you have?

400

Urgent or threatening language is a common sign of this type of attack.

What is a phishing email?

400

Public Wi-Fi networks are considered this compared to private networks.

What is less secure?

400

Software updates are important because they fix these weaknesses.

What are security vulnerabilities?

500

Ensuring data remains accurate, unchanged, and trustworthy is known as this.

What is integrity?

500

Face ID is an example of this type of authentication factor.

What is something you are?

500

Clicking suspicious links can result in malware infections or this.

What is data theft?

500

Encryption helps protect data while it is being sent across this.

What is a network or the internet?

500

An ethical hacker legally helps organizations improve this.

What is cybersecurity or security?