The Home Team
The Visiting Team
Off-Fence
De-Fence
The Half-Time Show
100

This type of Wi-Fi is safe.

What is Home Wi-Fi/

100

This type of Wi-Fi is not safe.

What is Public Wi-Fi?

100

This is not the best place to save your password.

What is your brain?

100

The best place to save your passwords.

What is an on-line password manager?

100

A network created from a big number of bots.

What is a botnet?

200

This malicious software records every keystroke, including passwords.

What is key logging?

200

This involves tricking individuals into providing their usernames and passwords by pretending to be a trustworthy entity.

What is Phishing?


200

WHH suggests encrypting your USB using this.

What is VeraCrypt?

200

It is a good idea to use VPN to protect this.

What is your DNS?

200

It is almost impossible to stop this type of attacks.

What is DDos? 

300

Regularly do this to computer software.

What is update?

300

One of the best encrypted email accounts to use in order to avoid hackers from accessing your email.

What is Proton email?

300

Don't do this from untrusted sources.

What is download?

300

This is an example of a good firewall.

What is CAPTCHA?

300

Using manipulation or deception to trick individuals into divulging their passwords.

What is Social Engineering?

400

When a third-party intercepts the communication between two parties. This can occur on insecure networks or the public Wi-Fi.

What is Man-in-the-Middle?

400

The term used when you re-use passwords across multiple accounts, a data breach on one platform can lead to attackers using those same credentials on other devices.

What is Credential Stuffing?

400

Don't share this type of of information unnecessarily.

What is personal information?

400

Don't click on these links?

What are suspicious links?

400

A mailicious software that is installed on your device without your knowledge. 

What is keylogging?

500

This phone is better for daily use because there's almost no malware on iOS.

What is an Apple iPhone?

500

6 methods scammers use to hack our passwords and secret keys.

What are Phishing, Brute Force Attacks, Key Logging, Credential Stuffing, Man-in-the-Middle Attacks, Social Engineering.

500

A good offense is to do this to all data.

What is backup all data?

500

This is more secure than Windows OS.

What is Linux?

500

99% of the time malware or viruses end in this way.

What is .dat, .bat, or .exe?