Passwords
Emails
Downloads
Websites
Predators
100

Creating a strong password.

What is a combination of letters and numbers?

100

Protect against vulnerbilities.

What is updating your software?

100

Program to keep up to date.

What is anti-virus software?

100

Green lock symbol.

What is a secure site?
100

Cautious interactions on websites, chat rooms, social media, are people who they claim.

What is online friendships? 

200

Risk of having same password across multiple sites.

What is security breach?

200

Response to suspicious emails.

What is delete immediately?

200

Trusted website.

What is a reputable source?

200

Performing regular backups.

What is storing files offsite

200
Use of monitoring against inappropriate content.

What is parental supervision?

300

Amount of time to change your password.

What is 3-6 months?

300

Unknown sender email.

What is a malware technique?

300

Website with positive views.

What is reading reviews and ratings?

300

GDPR, PCI DSS

What is regulation compliance.

300

Limiting the amount of personal information visible to strangers.

What is privacy settings?

400

Measure to take to protect their passwords.

What is reputable password manager?

400

Phishing emails tactics.

What is personal information, passwords, Social Security numbers and financial details?

400

Files from unofficial sources.

What is pirated content?

400

Seems to good to be true.

What is trusting your instincts?

400

Tactics of grooming behavior: flattery, attention, gifts, and promises.

What is grooming tactics?

500

Common techniques to crack passwords.

What is phishing?

500

2FA

What is two-factor authentication?

500

.exe, .bat, or .scr

What is unusual file extensions?

500

Sandbox environment.

What is testing environment for risky files?

500

Safety of child or teen involved.

What is reporting inappropriate behavior?