Bug Buster
Phishing Patrol
Threat Tracker
Secure Data
Keyboard Shortcuts
100

Broader term that encompasses all types of malicious software.

What is Malware?

100

Common signs of a phishing email include...

What are Misspellings, generic greetings, urgent language, suspicious links, and unexpected attachments?

100

Common methods to prevent cyber-attacks include...

What are Regular software updates, use unique and strong passwords, enable MFA, backup data, etc.?

100

A set of changes applied to a software to improve its functionality, fix bugs, enhance security, or add new features - crucial for maintaining performance and security of one's software and devices.

What is Software Update?

100

Keyboard shortcut for Copy and Paste.

What is Ctrl+C and Ctrl+V?

200

Malicious software designed to replicate itself and spread to other files or programs on a computer.

What is Virus?

200

Security tool that analyzes incoming emails, messages, and websites for signs of phishing activity - designed to protect users from malicious attacks by neutralizing suspicious emails.

What is Phishing Filter?

200

Type of cybercrime that impersonates legitimate institutions to trick individuals into revealing sensitive information; often done through deceptive emails, text messages, or websites that appear trustworthy.

What is Phishing?

200

Security measures that require users to provide two or more verification factors to gain access to an account.

What is Multi-factor Authentication (MFA)?

200

Keyboard shortcut for locking your PC.

What is Windows+L?

300

Malicious software that encrypts files or locks users out of their system, demanding payment to restore access.

What is Ransomware?

300

Technique where attackers create a fake website that looks like a legitimate one to steal information.

What is Website Spoofing?

300

Manipulation technique that uses psychological tactics to manipulate users into providing confidential sensitive information.

What is Social Engineering?

300

Creating copies of important documents or files and storing them in a separate location to protect against data loss.

What are Regular Backups?

300

Keyboard shortcut for zooming in and out.

What is Ctrl+Mouse Scroll?

400

Malicious software that secretly monitors and collects information without a user's consent.

What is Spyware?

400

This major company suffered a phishing attack in 2013 that compromised the data of 40 million customers.

What is Target?

400

Type of cybercrime where attackers disguise communication to appear from a known and trusted source.

What is Spoofing?

400

Service that creates a secure, encrypted connection between the user's device and the internet.

What is a Virtual Private Network (VPN)?

400

Keyboard shortcut for closing an application.

What is Alt+F4?

500

Malicious software designed to display advertisements on a user's device in forms of pop-ups or banners that disrupts a user's browsing experience.

What is Adware?

500

DPC employees can run malware scans on their computers using the application _____.

What is Sophos?

500

AI-generated forgeries that appear very real and have the potential to reshape public opinion and damage reputation.

What is Deepfake?

500

A network security that monitors and controls incoming and outgoing network traffic based on predetermined security rules - acts as a barrier between a trusted internal network and an unknown external network.

What is Firewall?

500

Keyboard shortcut for switching between open tabs and applications.

What is Alt+Tab?