Cybersecurity Basics trivia
Cybersecurity Basics Mini Quiz
Test your knowledge with these top questions!
What security step adds a texted code or app approval after entering a password?
Two-factor authentication requires a second verification step, such as a texted code or app-generated token, after entering a password to verify the user's identity and block unauthorized access.
What cyber attack uses deceptive emails from banks or friends to steal login details?
Phishing attacks exploit trust by impersonating legitimate sources, with the term originating from "fishing" for unsuspecting victims online.
What password practice resists cracking tools by mixing uppercase, lowercase, numbers, and symbols?
Using a mix of uppercase, lowercase, numbers, and symbols creates passwords with vastly higher entropy, making brute-force cracking exponentially slower—often taking years instead of seconds.
What network tool acts as a digital barrier to filter unauthorized traffic and threats?
The term "firewall" draws from building architecture, where a fire-resistant wall stops flames from spreading, much like it blocks unauthorized network traffic to protect systems.
What malware locks files via infected downloads and demands cryptocurrency payment?
The WannaCry ransomware attack in 2017 infected over 200,000 computers across 150 countries, encrypting files and demanding Bitcoin ransoms totaling about $4 million.