# Knowledge Check

<figure><img src="https://965862733-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FOlmvXzSHi3faUlqI4PsT%2Fuploads%2FxUHxyGuhiLyrOAcwxg3Z%2FScreen%20Shot%202023-10-13%20at%2010.58.01%20AM.png?alt=media&#x26;token=b38bdf2b-8c6f-4dc4-b119-f48e1e2af52a" alt=""><figcaption><p>What do we know?</p></figcaption></figure>

Before going into definitions and examples, it is a good idea to first evaluate our **current** knowledge.  This process will help with concept retention as we go over the concepts.

Take some time and answer the following questions.&#x20;

### Questions

#### Cybersecurity

1. **What** is it? Provide your own definition.
2. **Why** is it important to know about this topic?

#### Passwords

1. **How** safe are the passwords you use?
2. **How** do passwords work?
3. Can someone else, maybe a malicious agent, **guess** or **find** out your passwords? Provide examples.
4. **What** is a weak password?
5. **How** can you protect your passwords?

**Social Engineering**

1. **What** is it and does it affect you?
2. Name some **cyber** **threats** you know or have heard of.
3. Have you been **targeted** by a cyber threat?

#### Hacking

1. **What** is the first image or word that you think of when you hear the word **hacker**?
2. **How** would define the term **hacking**?
3. Are all hackers equal?
4. Have you heard of **ethical** **hacking**?  Try to define it.
5. Do you know about different "**colour** **hats**" in hacking?

{% hint style="info" %}
Your answers to these questions are your **knowledge baseline**.  Come back at the end of the curriculum and go over the questions to assess your learning. &#x20;
{% endhint %}

In the next section, we are tackling the concept of [**Passwords**](https://resources.digitalmoment.org/cybersecurity/passwords).
