What does "VPN" stand for?
Virtual Private Network
What is "phishing"?
A cyber attack using fake emails or messages to steal personal information
What is the recommended minimum length for a strong password?
12 characters
What was the name of the first computer virus?
Elk Cloner
What should you look for in a website’s URL to know it's secure?
HTTPS
What is the primary purpose of a firewall?
To monitor and control incoming and outgoing network traffic based on security rules
Which attack floods a system with traffic to make it unavailable?
Denial-of-Service (DoS)
What tool helps store and manage passwords securely?
Password manager
Who created the first major internet worm, the "Morris Worm"?
Robert Tappan Morris
Why should you avoid public Wi-Fi without a VPN?
It's insecure and can expose your data to hackers
Which type of malware disguises itself as legitimate software?
Trojan Horse
What is a "man-in-the-middle" attack?
An attack where the hacker intercepts communication between two parties
What is it called when you use the same password for multiple accounts?
Password reuse
In what year was Cybersecurity Awareness Month first observed?
2004
What is social engineering in cybersecurity?
Manipulating people to reveal confidential info
What does "2FA" stand for in cybersecurity?
Two-Factor Authentication
What type of malware locks your files and demands payment?
Ransomware
What type of attack involves guessing a password by trying many combinations rapidly?
Brute-force attack
What famous data breach in 2013 exposed 3 billion user accounts?
Yahoo Data Breach
Why should you update your software regularly?
To patch security vulnerabilities
Which protocol secures data being sent over the web, indicated by a padlock icon in browsers?
HTTPS
What is a "zero-day" vulnerability?
A flaw unknown to the software vendor with no available patch
What is biometric authentication?
Security verification using physical traits like fingerprint or face recognition
Which major 2017 ransomware attack affected over 200,000 computers globally?
WannaCry
What is the "principle of least privilege"?
Giving users the minimal level of access needed for their role