Online Threats
Password Security
Privacy Settings
Phishing Scams
Best Practices
100

This type of software is designed to harm or exploit devices.

What is malware?

100

A strong password should include a mix of these three types of characters. 

What are letters, numbers, and symbols?

100

Adjusting these on social media can help control who sees your information.  

What are privacy settings?

100

This is a common sign of a phishing email. 

 What is urgent language and a suspicious link?

100

This practice involves keeping your software up to date.  

What is regular software updates?

200

 This scam involves tricking individuals into giving away personal information.

What is phishing?

200

This practice involves using a different password for each online account. 

What is using unique passwords?

200

This type of audit involves reviewing and adjusting your privacy settings. 

What is a privacy settings audit? 

200

 This action should be taken if you receive a phishing email. 

What is report it as spam?

200

This type of network should be avoided for sensitive transactions like online banking. 

 What is public Wi-Fi?

300

 This type of attack involves sending fraudulent emails to steal personal information.  

What is a phishing attack?

300

This method adds an extra layer of security by requiring two forms of identification. 

What is two-factor authentication?

300

This setting can prevent strangers from seeing your posts on social media.  

What is setting your profile to private?

300

 This type of phishing targets specific individuals or organizations.

 What is spear phishing?

300

 This practice involves not sharing your passwords with others. 

What is password confidentiality?

400

This term describes unwanted software that can slow down your computer and steal information. 

What is spyware?

400

This type of password should be avoided because it is easy to guess. 

What is a simple password (e.g., "password" or "123456")?

400

This feature can help you control who can tag you in photos and posts. 

 What is tag review?

400

This term describes a fake website designed to steal your information. 

What is a phishing site?

400

This feature can help protect your accounts by requiring a second form of identification. 

What is two-factor authentication?

500

This type of online threat involves locking users out of their systems until a ransom is paid. 

What is ransomware?

500

This tool can help you manage and store multiple strong passwords securely.  

What is a password manager?

500

Regularly updating these can help protect your personal information. 

What are privacy settings?

500

This practice involves verifying the sender's email address before clicking on links. 

 What is email verification?

500

This practice involves being cautious about the information you share online. 

What is mindful sharing?