đŸ„ Trivia Gong
1 player online

Internet Safety Trivia

Internet Safety trivia explores the ideas and incidents that shaped how we protect personal information, recognize online threats, and navigate the web more confidently. From early concerns about email scams and weak passwords to today’s focus on privacy, phishing, and digital footprints, it offers a clear, family-friendly way to learn why good security habits matter.

Emoji collage hero image for Internet Safety Trivia

Easy Internet Safety Trivia

13 questions

These easy Internet Safety trivia questions are great for beginners and kids around age 12 and under.

  1. Question 1

    What web protocol adds TLS encryption to ordinary HTTP traffic?

    Answer: HTTPS

    HTTPS is the secure version of HTTP because it adds TLS encryption to web traffic.

  2. Question 2

    What security tool filters network traffic using configured rules?

    Answer: A firewall

    A firewall checks network traffic and allows or blocks it based on rules.

  3. Question 3

    What do you call a group of compromised devices controlled together?

    Answer: A botnet

    A botnet is a network of hacked or compromised devices run is a group.

  4. Question 4

    Which U.S. federal agency focuses on cybersecurity and infrastructure security?

    Answer: CISA

    CISA is the federal cybersecurity agency of the United States.

  5. Question 5

    Which browser routes traffic through the Tor network to help obscure your IP address?

    Answer: Tor Browser

    Tor Browser sends traffic through the Tor network to help hide a user's IP address.

  6. Question 6

    What is the common abbreviation for Data Protection Officer?

    Answer: DPO

    Data Protection Officer is commonly shortened to DPO.

  7. Question 7

    A SOC analyst works in what kind of center?

    Answer: A Security Operations Center

    SOC stands for Security Operations Center.

  8. Question 8

    Google's headquarters are in which California city?

    Answer: Mountain View

    Google is headquartered in Mountain View, California.

  9. Question 9

    Meta is headquartered in what California city?

    Answer: Menlo Park

    Meta's headquarters are in Menlo Park, California.

  10. Question 10

    Microsoft's headquarters are located in which Washington city?

    Answer: Redmond

    Microsoft is headquartered in Redmond, Washington.

  11. Question 11

    Apple is headquartered in which California city?

    Answer: Cupertino

    Apple's headquarters are in Cupertino, California.

  12. Question 12

    The Electronic Frontier Foundation is based in what city?

    Answer: San Francisco

    The Electronic Frontier Foundation is based in San Francisco.

  13. Question 13

    In what year did Facebook launch, raising the profile of social-media privacy settings?

    Answer: 2004

    Facebook launched in 2004.

Internet Safety Family Trivia

12 questions

These family Internet Safety trivia questions are built for mixed-age game nights, classrooms, and groups.

  1. Question 1

    Who created Pretty Good Privacy, often called PGP, in 1991?

    1. A.Whitfield Diffie
    2. B.Michael Mann
    3. C.Phil Zimmermann
    4. D.Bram Cohen

    Answer: Phil Zimmermann created Pretty Good Privacy in 1991.

    Pretty Good Privacy, or PGP, was created by Phil Zimmermann in 1991.

  2. Question 2

    One of the co-creators of RSA shares a last name with the S in the initials. Who is it?

    Answer: Adi Shamir is one of the co-creators of RSA.

    RSA is named from the surnames Rivest, Shamir, and Adleman. Adi Shamir is the S.

  3. Question 3

    In the name RSA, which person is represented by the letter A?

    1. A.Adi Shamir
    2. B.Ron Rivest
    3. C.Whitfield Diffie
    4. D.Leonard Adleman

    Answer: Leonard Adleman is the A in RSA.

    The A in RSA stands for Adleman, referring to Leonard Adleman.

  4. Question 4

    If you were spelling out RSA from its creators' names, who gives the letter R?

    Answer: Ron Rivest is the R in RSA.

    The R in RSA comes from Ron Rivest's last name.

  5. Question 5

    Which computer scientist helped create the Diffie-Hellman key exchange?

    1. A.Moxie Marlinspike
    2. B.Simon Singh
    3. C.Whitfield Diffie helped create the Diffie-Hellman key exchange.
    4. D.Phil Zimmermann

    Answer: Whitfield Diffie helped create the Diffie-Hellman key exchange.

    Whitfield Diffie is one of the people behind the Diffie-Hellman key exchange.

  6. Question 6

    What protocol was created by Bram Cohen?

    Answer: Bram Cohen created the BitTorrent protocol.

    Bram Cohen is known for creating the BitTorrent protocol.

  7. Question 7

    Which person co-founded Signal?

    1. A.Moxie Marlinspike co-founded Signal.
    2. B.Kevin Mitnick
    3. C.Andy Greenberg
    4. D.Ron Rivest

    Answer: Moxie Marlinspike co-founded Signal.

    Signal was co-founded by Moxie Marlinspike.

  8. Question 8

    Kevin Mitnick wrote a memoir with a spooky title. What is it called?

    1. A.Sandworm
    2. B.Blackhat
    3. C.Ghost in the Wires
    4. D.The Code Book

    Answer: Kevin Mitnick wrote the memoir 'Ghost in the Wires.'

    Kevin Mitnick's memoir is titled 'Ghost in the Wires.'.

  9. Question 9

    Who wrote the cybersecurity book 'Sandworm'?

    Answer: Andy Greenberg wrote the cybersecurity book 'Sandworm.'

    The book 'Sandworm' was written by Andy Greenberg.

  10. Question 10

    Which author wrote 'The Code Book'?

    1. A.Phil Zimmermann
    2. B.Leonard Adleman
    3. C.Simon Singh wrote the book 'The Code Book.'
    4. D.Andy Greenberg

    Answer: Simon Singh wrote the book 'The Code Book.'

    'The Code Book' was written by Simon Singh.

  11. Question 11

    Who directed the 2015 film 'Blackhat'?

    Answer: Michael Mann directed the 2015 film 'Blackhat.'

    The 2015 film 'Blackhat' was directed by Michael Mann.

  12. Question 12

    What is the term for deceptive messages that try to trick people into giving away information?

    1. A.ransomware
    2. B.CAPTCHA
    3. C.BitTorrent
    4. D.phishing

    Answer: The term is phishing.

    Phishing means trying to fool people into revealing information through deceptive messages.

Fun Internet Safety Trivia

13 questions

These fun Internet Safety trivia questions highlight surprising moments and playful facts for game-night groups.

  1. Question 1

    What was the name of the 1988 internet troublemaker that became the first widely recognized computer worm online?

    Answer: The Morris Worm.

    The Morris Worm, released in 1988, is widely recognized is the first major computer worm on the Internet.

  2. Question 2

    The Budapest Convention gets its name from which city?

    1. A.Vienna
    2. B.Brussels
    3. C.Prague
    4. D.Budapest

    Answer: Budapest.

    It is named after Budapest, where the convention was opened for signature.

  3. Question 3

    If you mailed a postcard to Europol headquarters, which city should go on the envelope?

    Answer: The Hague.

    Europol is headquartered in The Hague.

  4. Question 4

    Interpol calls which French city home?

    Answer: Lyon.

    Interpol is headquartered in Lyon, France.

  5. Question 5

    In what year did the California Consumer Privacy Act take effect?

    Answer: 2020.

    The California Consumer Privacy Act took effect in 2020.

  6. Question 6

    GDPR started applying across the European Union in what year?

    Answer: 2018.

    The GDPR began applying in 2018.

  7. Question 7

    What is the name of Australia's national cybersecurity center?

    Answer: The Australian Cyber Security Centre.

    Australia's national cybersecurity center is the Australian Cyber Security Centre.

  8. Question 8

    Tallinn, Estonia is home to which cyber defense organization with a very long name?

    Answer: The NATO Cooperative Cyber Defence Centre of Excellence.

    The NATO Cooperative Cyber Defence Centre of Excellence is based in Tallinn, Estonia.

  9. Question 9

    The famous xkcd comic "Password Strength" landed online in which year?

    Answer: 2011.

    Xkcd posted the comic 'Password Strength' in 2011.

  10. Question 10

    The line "There is no patch for human stupidity" is commonly heard in what kind of training?

    1. A.security awareness training
    2. B.Network engineering training
    3. C.Database administration training
    4. D.Graphic design training

    Answer: Security awareness training.

    This phrase is commonly used in security awareness training.

  11. Question 11

    Before his 2013 disclosures, who worked for the NSA as a contractor?

    Answer: Edward Snowden.

    Edward Snowden worked for the NSA is a contractor before his 2013 disclosures.

  12. Question 12

    Which book is about the zero-day market: "This Is How They Tell Me the World Ends" or "The Phoenix Project"?

    1. A.Tell Me
    2. B.The Phoenix Project
    3. C.Cryptonomicon
    4. D.The Cuckoo's Egg

    Answer: "This Is How They Tell Me the World Ends."

    The book 'This Is How They Tell Me the World Ends' is about the zero-day market.

  13. Question 13

    In security jargon, what do you call a software flaw that the vendor doesn't know about when it's first exploited or disclosed?

    Answer: A zero-day.

    A zero-day is a software flaw unknown to the vendor when first exploited or disclosed.

Funny Internet Safety Trivia

13 questions

These funny Internet Safety trivia questions highlight playful moments, odd facts, and inside jokes.

  1. Question 1

    That classic scam email with more drama than a soap opera is called “419 fraud.” What does the “419” refer to?

    1. A.A Nigerian area code
    2. B.A section of Nigeria's criminal code
    3. C.A 4:19 p.m. timestamp used in spam filters
    4. D.An Interpol case number

    Answer: It is named after a section of Nigeria's criminal code.

    The term “419 fraud” comes from the relevant section of Nigeria's criminal code, not from a phone code or case number.

  2. Question 2

    If an email claims royalty needs your help moving money, what kind of scheme is the so-called “Nigerian prince scam”?

    1. A.A phishing-free charity appeal
    2. B.An advance-fee fraud email scheme.
    3. C.A ransomware attack
    4. D.A password-reset scam

    Answer: An advance-fee fraud email scheme.

    The “Nigerian prince scam” is a common name for an advance-fee fraud, where victims are promised a reward after paying upfront.

  3. Question 3

    You click a totally normal link and suddenly 1987 punches through your speakers. Who is the artist most associated with a classic rickroll?

    1. A.Phil Collins
    2. B.George Michael
    3. C.David Bowie
    4. D.Rick Astley

    Answer: Rick Astley.

    Rickrolling famously uses Rick Astley's 1987 song “Never Gonna Give You Up.”.

  4. Question 4

    Which 2014 horror game helped popularize the jump-scare warning style that later showed up in web-safety jokes?

    1. A.Amnesia: The Dark Descent
    2. B.Slender: The Eight Pages
    3. C.Five Nights at Freddy's.
    4. D.Outlast

    Answer: Five Nights at Freddy's.

    The 2014 game “Five Nights at Freddy's” is the one cited here for popularizing that jump-scare warning style.

  5. Question 5

    Which famously strong meme-style password phrase sounds like a farm supply list but is actually a security example?

    Answer: correct horse battery staple

    “correct horse battery staple” is the well-known example passphrase.

  6. Question 6

    The comic that made “correct horse battery staple” internet-famous has a specific number. Which one is it?

    1. A.404
    2. B.451
    3. C.1337
    4. D.936

    Answer: 936.

    The xkcd comic that popularized the phrase is number 936.

  7. Question 7

    When tech support mutters “PEBKAC,” what are they expanding it to?

    1. A.Password Entered By Keyboard And Computer
    2. B.Peripheral Error Between Keycaps And Circuit
    3. C.Program Error Blocking Keys And Commands
    4. D.Problem Exists Between Keyboard And Chair.

    Answer: Problem Exists Between Keyboard And Chair.

    PEBKAC is a joking acronym for “Problem Exists Between Keyboard And Chair.”.

  8. Question 8

    True or false: “ID10T error” is joking shorthand for “idiot error.”?

    Answer: True

    “ID10T” visually resembles the word “idiot,” making it a joking label for user error.

  9. Question 9

    In a social-engineering test, if someone leaves a USB drive lying around like digital sidewalk candy, what is that tactic called?

    1. A.A drift injection
    2. B.drop attack
    3. C.A splash attack
    4. D.A bounce exploit

    Answer: A drop attack.

    A bait USB drive planted for someone to pick up and use is called a drop attack.

  10. Question 10

    What’s the term for solving a computer problem by explaining it out loud, even if your audience is a very patient bath toy?

    Answer: Rubber duck debugging.

    Rubber duck debugging means talking through a problem step by step to clarify your thinking.

  11. Question 11

    At DEF CON, what is the name of the area focused on election security rather than just giving your laptop stage fright?

    1. A.Ballot Bunker
    2. B.Democracy Lab
    3. C.Election Arcade
    4. D.Voting Village

    Answer: Voting Village.

    DEF CON has hosted Voting Village, a space focused on election security.

  12. Question 12

    Before many people learned to fear conference Wi‑Fi, in what year did DEF CON begin in Las Vegas?

    1. A.1989
    2. B.1996
    3. C.2001
    4. D.1993

    Answer: 1993.

    DEF CON began in Las Vegas in 1993.

  13. Question 13

    Which annual hacking contest started in 2007 and has one of the most brag-worthy names in security culture?

    1. A.Zero Day Derby
    2. B.Pwn2Own
    3. C.Hack the Planet
    4. D.RootFest

    Answer: Pwn2Own.

    The annual Pwn2Own hacking contest started in 2007.

Hard Internet Safety Trivia

14 questions

These hard Internet Safety trivia questions are for expert fans who want a real challenge.

  1. Question 1

    Which three surnames give RSA its name?

    Answer: Rivest, Shamir, and Adleman.

    RSA is named after its creators: Rivest, Shamir, and Adleman.

  2. Question 2

    In what year did Diffie and Hellman publish their landmark public-key cryptography paper?

    Answer: 1976.

    The landmark Diffie-Hellman public-key cryptography paper was published in 1976.

  3. Question 3

    In SHA-256, what does the "SHA" portion expand to?

    Answer: Secure Hash Algorithm.

    SHA stands for Secure Hash Algorithm.

  4. Question 4

    AES works on blocks of what exact size?

    1. A.64 bits
    2. B.192 bits
    3. C.256 bits
    4. D.128 bits

    Answer: 128 bits.

    AES uses a fixed block size of 128 bits.

  5. Question 5

    What key length is used by the variant called AES-256?

    Answer: A 256-bit key.

    AES-256 specifically uses a 256-bit key.

  6. Question 6

    Spell out the security protocol abbreviated as TLS.?

    Answer: Transport Layer Security.

    TLS stands for Transport Layer Security.

  7. Question 7

    True or false: Seeing a padlock icon by itself proves a website is trustworthy.?

    Answer: False

    A padlock icon alone does not prove that a website is trustworthy.

  8. Question 8

    What does DNS stand for in internet infrastructure?

    Answer: Domain Name System.

    DNS expands to Domain Name System.

  9. Question 9

    Which technology was designed to add authentication to DNS data?

    Answer: DNSSEC.

    DNSSEC is intended to add authentication to DNS data.

  10. Question 10

    What identifier is used to track a publicly disclosed security vulnerability?

    Answer: A CVE identifier.

    A CVE identifier is used to track publicly disclosed security vulnerabilities.

  11. Question 11

    Expand the abbreviation CVE.?

    Answer: Common Vulnerabilities and Exposures.

    CVE stands for Common Vulnerabilities and Exposures.

  12. Question 12

    The initials CVSS stand for what scoring framework?

    Answer: Common Vulnerability Scoring System.

    CVSS expands to Common Vulnerability Scoring System.

  13. Question 13

    If a service is overwhelmed by traffic from many sources at once, what kind of attack is that?

    Answer: A distributed denial-of-service attack.

    DDoS stands for distributed denial-of-service attack.

  14. Question 14

    Which attack works by inserting malicious SQL into database queries?

    Answer: SQL injection.

    SQL injection targets database queries through malicious SQL input.

Download PDF

Get the generated PDF file for printing, classroom rounds, or offline use.

Download printable trivia PDF