Basics
Cyber Attacks
Password & Identity Security
History and Facts
Safe Practices
100

What does "VPN" stand for?

Virtual Private Network

100

What is "phishing"?

A cyber attack using fake emails or messages to steal personal information

100

What is the recommended minimum length for a strong password?

12 characters

100

What was the name of the first computer virus?

Elk Cloner

100

What should you look for in a website’s URL to know it's secure?

HTTPS

200

What is the primary purpose of a firewall?

To monitor and control incoming and outgoing network traffic based on security rules

200

Which attack floods a system with traffic to make it unavailable?

Denial-of-Service (DoS)

200

What tool helps store and manage passwords securely?

Password manager

200

Who created the first major internet worm, the "Morris Worm"?

Robert Tappan Morris

200

Why should you avoid public Wi-Fi without a VPN?

It's insecure and can expose your data to hackers

300

Which type of malware disguises itself as legitimate software?

Trojan Horse

300

What is a "man-in-the-middle" attack?

An attack where the hacker intercepts communication between two parties

300

What is it called when you use the same password for multiple accounts?

Password reuse

300

In what year was Cybersecurity Awareness Month first observed?

2004

300

What is social engineering in cybersecurity?

Manipulating people to reveal confidential info

400

What does "2FA" stand for in cybersecurity?

Two-Factor Authentication

400

What type of malware locks your files and demands payment?

Ransomware

400

What type of attack involves guessing a password by trying many combinations rapidly?

Brute-force attack

400

What famous data breach in 2013 exposed 3 billion user accounts?

Yahoo Data Breach

400

Why should you update your software regularly?

To patch security vulnerabilities

500

Which protocol secures data being sent over the web, indicated by a padlock icon in browsers?

HTTPS

500

What is a "zero-day" vulnerability?

A flaw unknown to the software vendor with no available patch

500

What is biometric authentication?

Security verification using physical traits like fingerprint or face recognition

500

Which major 2017 ransomware attack affected over 200,000 computers globally?

WannaCry

500

What is the "principle of least privilege"?

Giving users the minimal level of access needed for their role