A utility, often installed on a browser by default, that stops unrelated ads or pages from opening while on websites.
Why shouldn't I use this password? henryhenry1
Don't use your name for your password. Use capital letters and special characters to increase complexity. Repeating words is easier to crack in brute force attacks.
This internet protocol keeps form information safe by encrypting with the Secure Sockets Layer (SSL).
What is HTTPS?
This describes adding permissions to users, such as moderation rights on a Twitch stream, or write permission on a file system.
What is authentication?
A hacker from Russia has Jenny's IP address and is trying to access her computer without her knowledge. Why can't he connect to her IP address?
Network firewall.
This anti-virus comes preinstalled on all Windows personal computers.
What is Windows Defender?
Why shouldn't I use the same password for every website?
Because if one database you use gets breached, people have your password for every website.
This type of attack is most commonly used to gain access to something more secure and valuable, such as a home network or a database. It involves tricking someone into believing they are in a position of authority or trust.
What is social engineering?
Logging events that happen on an account, such as log-in times and pages accessed, is an example of this.
What is accounting?
An online store has two server locations in Houston and El Paso. If Houston's internet has difficulties, the traffic for the store will be routed through El Paso until the problem is solved. What is this an example of?
Network redundancy.
The operating system that popular mobile OS Android is built based off, this OS is a hit with programmers and has virtually no malware.
What is Linux?
Why shouldn't I put my password into this website? http://domain.com
It's HTTP, so data you enter into the site is not encrypted.
This type of attack is why CAPTCHAs exist: it involves flooding a server with a massive amount of requests or connection attempts in order to slow it or destroy it.
What is a denial of service attack (DOS)?
This type of authentication requires a user to have different types of proof as to who they are, such as a password and a NFC tag.
What is multifactor authentication?
Sarah is scheduled for an SAT test where she has to be fingerprinted when she enters the room. Whenever she leaves and comes back, she must do it again. What type of authentication is Sarah doing for her test?
Type 3 authentication.
This encryption standard is what almost all data transfers are protected with on the internet today - a 256-bit algorithm that is virtually unbreakable.
What is AES (Advanced Encryption Standard)?
Why shouldn't I put my debit card into this website? https://www.paypal.com
Credit cards have stronger theft safeguards.
This ancient precursor to encryption involved shifting every letter 3 places, making messages unreadable to anyone who didn't have the key.
What is the Caesar cipher?
This is the method of taking measures to verify the identity of someone before performing an action - type 3 authentication is most commonly used for this.
What is non-repudiation?
Philip is buying a new gaming rig for home and needs to get rid of his old computer for space. What should he do before he throws away or sells his old computer?
Remove the RAM and hard drive.
This encryption, which can be as advanced as 384 bits, protects data sent over WiFi connections.
WPA3
(Will accept WPA2.)
Why shouldn't I log into my account from the airport WiFi?
Public networks are unsecured, which means any user on the network can easily intercept and decrypt traffic.
This type of ACL emphasizes ownership of a file - only the owner has full rights, and some of those rights can be imparted to others if the owner allows.
What is discretionary access control (DAC)?
This piece of equipment comes with a battery that keeps electronics running for long enough to shut down safely in the event of a power outage.
What is a UPS (Uninterruptible Power Supply)?
Terrence gets an unusual e-mail from his co-worker Linda - it asks him to enter his secure information into a website not normally used in his work. However, Linda has a code she uses to authenticate all of her e-mails, and she has given the genuine code. In this instance, Linda may be a victim of what?
Identity theft. (Also accepted: spear phishing)