Phishing Frenzy
Password Pitfalls
Device Defense
Safe Surfing
Social Engineering Sleuths
100

What is a phishing email?

Unexpected request for personal information

100

What is a strong password composed of?

Uppercase, lowercase, numbers, and symbols

100

What should you do before leaving your workstation?

Lock your screen

100

What is a VPN used for?

Encrypting internet traffic

100

What is social engineering?

Manipulating people to gain confidential info

200

What should you do if you suspect a phishing email?

Report it to IT or security team

200

What is a common mistake when creating passwords?

Using easily guessable words

200

What is a secure way to dispose of old devices?

Wipe data and follow disposal policy

200

Why is public Wi-Fi risky?

It may be insecure or monitored

200

What is a common social engineering tactic?

Valid answers include: Impersonation, Pretexting, Phishing, Tailgating, Baiting

300

What type of link is often used in phishing emails?

Malicious or spoofed URL

300

What tool helps manage multiple strong passwords?

Password manager

300

What type of software protects against malware?

Antivirus

300

What browser feature helps block malicious sites?

Security extensions or filters

300

What should you do if someone asks for access they shouldn't have?

Deny and report the request

400

What is the safest way to verify a suspicious email?

Contact the sender through a known method

400

How often should you change your passwords?

When compromised or required

400

What is a risk of using unauthorized USB drives?

Malware infection

400

What should you check before entering credentials on a website?

HTTPS in the URL

400

What is tailgating in cybersecurity?

Following someone into a secure area

500

What is the goal of most phishing attacks?

Steal credentials or sensitive data

500

What is the recommended minimum length for a secure password?

12 characters

500

What is one way to prevent unauthorized physical access to a device?

Use cable locks or secure the device in a locked cabinet

500

What is a safe practice when downloading files?

Download from trusted sources only

500

What is pretexting?

Creating a false scenario to obtain information