Security Basics
Types of Threats
Encryption Methods
Personal Safety
SSQRP
100

The information that can be used to identify a specific person, like SSN or address.

What is Personally Identifiable Information?

100

Malicious software designed to damage or gain unauthorized access to a computer system.

What is Malware?

100

Name three characteristics of a strong password.

"Easy to remember, hard to guess"

Long (over 16 characters), mix of letters/numbers/symbols, no personal info (name, birthday, etc), not used with other accounts, no common words/sequences ("1234", "9999", "password", etc) 

100

The practice of protecting computer systems and data from malicious actors and unauthorized access. 

What is security?

100


Which of the following data is necessary for Snappy to display "Happy Moments" for a particular city?


 A.   The user's current location.

 B.   Access to photos from the user's device

 C.   Photos tagged by location that are submitted by any user.

 D.   Ratings for each photo. 

Photos tagged by location that are submitted by any user.

200

This is someone who uses either social engineering or technical exploits to gain unauthorized access to a computing device. 

What is a Hacker?

200

A type of malware that can replicate itself and spread to other computers.

What is a Virus?

200

The piece of information needed to undo a cipher. 

What is the Key?

200

The ability to control what personal information is collected and how it's used.

What is Privacy?

200

Which of the following data is LEAST likely to be included in the rankings of users on the leaderboard?

 A.   The number of ratings a "Happiness Moment" received.

 B.   The number of comments a "Happiness Moment" received.

 C.   The location of a "Happiness Moment".

 D.   The number of "Happiness Moments" a user has submitted. 

The number of comments a "Happiness Moment" received.

300

The process of converting readable data into a coded format to protect it.

What is Encryption?

300

A deceptive attempt to steal sensitive information by posing as a trustworthy entity.

What is Phishing?

300

A simple substitution cipher that shifts letters by a fixed number of positions.

What is Caesar Cipher?

300

This verification method requires multiple forms of proof of identity to access an account.

What is Multi-factor Authentication?

300

Which of the following may be an unintended effect of the use of Snappy?

 A.   Users may identify other Snappy users in their own town.

 B.   Large towns might look "happier" than small towns.

 C.   Users can rate "Happiness Moments" with emojis.

 D.   Users are prevented from leaving negative comments. 

Large towns might look "happier" than small towns.



400

The process of converting protected data back into its original readable format.

What is Decryption?

400

Software that records keystrokes to capture passwords and other sensitive information.

What is Keylogging?

400

An encryption method where the same key is used to encrypt and decrypt data.

What is Symmetric Key Encryption?

400

Software that helps detect and remove malicious programs from a computer.

What is Computer Virus Scanning Software?

400


Which of the following is LEAST likely to be a benefit of Snappy?

 A.   Users are happier after using the app.

 B.   A town can attract tourists based on the number of "Happiness Moments" tagged with that town's location.

 C.   Users may not rank other users' "Happiness Moments" because they want to stay on the top of the leaderboard.

 D.   Users look for "Happiness Moments" to document in their everyday lives. 

Users may not rank other users' "Happiness Moments" because they want to stay on the top of the leaderboard.

500

A mathematical rule used to encrypt and decrypt messages.

What is a Cipher?

500

A wireless access point set up by attackers to intercept network traffic.

What is a Rogue Access Point?

500

An encryption system using two different keys - one public and one private.

What is Public Key Encryption?

500

This is a best practice to keep any computing device safe from unauthorized access by reducing the number of known vulnerabilities.

What is keeping software up to date?

500

Which of the following is the most likely data privacy concern for Snappy users?

 A.   Photos uploaded to the app and tagged with location may contain identifiable information like people's faces or street names.

 B.   A user's ranking on the leaderboard.

 C.   Machine Learning used to moderate the comments on "Happiness Moments".

 D.   Use of emojis to rate "Happiness Moments". 

Photos uploaded to the app and tagged with location may contain identifiable information like people's faces or street names.

M
e
n
u