1. What is the term for the act of secretly observing and recording someone's keystrokes on a computer? Keylogging
2. What is the most commonly used password worldwide? 123456
3. Who are White hat hackers? Ethical hackers
4. What do the initials 'DDoS' stand for in relation to cyber attacks? Distributed Denial of Service
5. What is the term for a type of malware that blocks access to a computer system until a ransom is paid? Ransomware
6. Which of the following is an example of a strong password? 5Tr0ngP@55w0rd!
7. What is the term for a software that appears to perform a desirable function but actually performs malicious actions? Trojan
8. What is the term for a security measure that verifies the identity of a user by combining two or more different authentication factors? Two-factor authentication
9. Which of the following is NOT a common cybersecurity best practice? Using the same password for multiple accounts
10. What is the process of making digital data unreadable to unauthorized users? Encryption
11. What is the term for a program that replicates itself and spreads to other computers? Virus
12. What is the first line of defense in protecting against cybersecurity threats? User awareness
13. Which of the following is a common method used by hackers to gain unauthorized access to a computer network? Brute-force attack
14. Which type of cyber attack aims to deceive users into providing sensitive information? Phishing
15. What is the term for a software vulnerability that can be exploited by hackers? Zero-day