Unit 1: Advanced Cryptography
Unit 2: Steganography
Unit 3: Advanced Networking
Cybersecurity Trivia
Potpourri
100

This encryption method uses the same key for both encryption and decryption.

What is symmetric encryption?

100

The tiny objects that make up an image and that are modified when hiding a text or image inside an image are called this:

What are pixels?

100

When you sign into a website using your password and are then prompted to enter a code you received on your mobile phone to continue, this is known as:

What is two-factor authentication?

100

The S in https stands for this:

What is Secure?

100

Atlanta was not always the capital of Georgia - it was actually this city. 

What is Savannah?

200

This process scrambles data so only authorized parties can understand it.

What is encryption?

200

In addition to pictures and text that may be hidden within an image, this type of file may also be hidden in plain sight.

What is an audio file?

200

 the regulation and management of environmental factors like temperature, humidity, air quality, and light, aiming to maintain a specific or desirable environment for various purposes

What are environmental controls?

200

A type of cyber attack, via email, aims to deceive users into providing sensitive information.

What is phishing?

200

The largest state east of the Mississippi river.

What is Georgia?

300

A strong password should be at least 8 to 12 characters long and include a mix of letters, numbers, and symbols. These are the type of requirements.

What are complexity requirements?

300

Unlike encryption, which scrambles a message to make it unreadable, steganography does this to a message.

What is concealing it (hiding it within another medium)?

300

This is something you have, something you are, and something you know.

What is multi-factor authentication?
300

 attackers encrypt data and demand payment for its release, cause significant financial and operational disruption.

What is ransomware?

300

The country with the largest number of lakes in the world.

What is Canada?

400

In order to decrypt cipher text there is something you must have or know to crack the code. This is referred to as the:

What is the key?

400

Pictures with hidden images, like the ones we looked at in CodeHS, are often called:

Magic Eye Pictures/Images

400

the automated recognition of individuals by means of unique physical characteristics, typically for the purposes of security.

What is biometrics?

400

95% of breaches attributed to it every year.

What is human error?

400

This team won the 2024 NBA Championship.

Who are the Boston Celtics?

500

When you are trying to decrypt a message sometimes you notice patterns or repeating letters. This is referred to as:

What is frequency analysis?

500

In digital steganography, this type of file is commonly used to conceal hidden messages due to its ability to store redundant data without noticeable quality loss.

What is an image file (e.g., PNG, BMP, or JPEG)?

500

Some workplaces and schools/universities do not provide devices such as cell phones, printers, and even computers. In those scenarios, users must provide their own technology. This is known as: 

What is BYOD? (what does this stand for?)

500

The CIA triad stands for this: 

What is confidentiality, integrity, and availability?

500

The largest mammal in the world.

What is the blue whale?

M
e
n
u