What is a phishing email?
Unexpected request for personal information
What is a strong password composed of?
Uppercase, lowercase, numbers, and symbols
What should you do before leaving your workstation?
Lock your screen
What is a VPN used for?
Encrypting internet traffic
What is social engineering?
Manipulating people to gain confidential info
What should you do if you suspect a phishing email?
Report it to IT or security team
What is a common mistake when creating passwords?
Using easily guessable words
What is a secure way to dispose of old devices?
Wipe data and follow disposal policy
Why is public Wi-Fi risky?
It may be insecure or monitored
What is a common social engineering tactic?
Valid answers include: Impersonation, Pretexting, Phishing, Tailgating, Baiting
What type of link is often used in phishing emails?
Malicious or spoofed URL
What tool helps manage multiple strong passwords?
Password manager
What type of software protects against malware?
Antivirus
What browser feature helps block malicious sites?
Security extensions or filters
What should you do if someone asks for access they shouldn't have?
Deny and report the request
What is the safest way to verify a suspicious email?
Contact the sender through a known method
How often should you change your passwords?
When compromised or required
What is a risk of using unauthorized USB drives?
Malware infection
What should you check before entering credentials on a website?
HTTPS in the URL
What is tailgating in cybersecurity?
Following someone into a secure area
What is the goal of most phishing attacks?
Steal credentials or sensitive data
What is the recommended minimum length for a secure password?
12 characters
What is one way to prevent unauthorized physical access to a device?
Use cable locks or secure the device in a locked cabinet
What is a safe practice when downloading files?
Download from trusted sources only
What is pretexting?
Creating a false scenario to obtain information