Cyber Security Term 3
Cyber Security Term 3
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Cyber Security Questions
1. What is a cyber threat?
2. Which of the following is an example of hacking?
3. True or False: Hacking always involves physical access to a computer system.
4. Which of the following is an email threat?
5. What is a strong password?
6. True or False: A common way for viruses and malware to spread is through email attachments and unsafe
downloads.
7. Which type of malware is designed to lock or encrypt files and demand payment for their release?
8. A strong password should be at least ___ characters long.
9. What is phishing?
10. Match the term with its definition: Pharming
11. True or False: Spoofing involves pretending to be someone else to gain trust and access sensitive information.
12. Which of the following is a best practice for protecting yourself online?
13. What is an impact of a major data breach?
14. Which practice is NOT recommended for protecting yourself online?
15. True or False: Regularly updating your software and antivirus is important for protecting your devices.