Personal Identifiable Information (PII) and Secure Internet Protocols
Encryption and Secure Internet Protocols
Cyber Attacks
User Authentication
Data Tracking
100

The term for sensitive information that includes name, date of birth, and Social Security number.

What is sensitive personal information?

100

This type of encryption uses the same key to both encrypt and decrypt data.

What is symmetric encryption?

100

This type of attack involves tricking individuals into revealing sensitive information, such as login credentials or credit card numbers, through deceptive emails, texts, or websites.

What is a phishing attack?

100

Create an initialism, combine unrelated words together, and use a manager are three recommended strategies for creating and managing these.

What are passwords?

100

This technology is used to track user behavior on websites by dropping a small piece of code on the user's browser.

What is a tracking website cookie?

200

The term for information that can be used to indirectly identify an individual, such as age, gender, or occupation.

What is Indirectly Identifiable Information?

200

The two keys used in asymmetric encryption?

What are public and private keys?

200

This type of malicious software is designed to replicate itself and spread from one computer to another.

 What is a virus?

200

This type of authentication is based on unique physical or behavioral characteristics of an individual, such as fingerprints or voice patterns.

What is biometric or inherence-based authentication?

200

These types of cookies are created by a website other than the one you are currently visiting and are often used for tracking user behavior and serving targeted ads.

What is a third-party cookie?

300

The name of the European legislation designed to protect the privacy of personal information held by organizations.

 What is General Data Protection Regulation (GDPR)?

300

This is the term used to describe the process of decoding encrypted data without having access to the key used to encrypt it.

What is cracking?

300

This type of self-replicating malware is capable of spreading without any user interaction or intervention by exploiting vulnerabilities in network protocols or operating systems.

What is a worm?

300

One of the most common pieces of information used for knowledge-based authentication?

What is password, pin, or security questions.

300

This type of cookie is used by online shopping sites to remember the items in your cart and your login information to improve your shopping experience.

What is a session cookie?

400

This protocol is used to encrypt data that is transmitted over the internet and is represented by a padlock icon in the browser.

What is HTTPS?

400

This encryption method is based on mathematical problems that are easy to solve in one direction but difficult to solve in the reverse direction.  

What is asymmetric encryption?

400

Three types of malware that can launch a coordinated attack.

What are trojan horses, viruses, and worms?

400

This type of authentication requires a physical object, such as a key fob or smart card, to verify the identity of a user.

What is possession-based authentication?

400

Common technology used to determine the geolocation of a device?

What is GPS?

500

This protocol is used to provide secure remote access to a private network, often used by companies for employees to work remotely.

 What is a virtual private network (VPN)?

500

This secure internet protocol is used to authenticate clients and servers to ensure that they are who they claim to be.

What is SSL/TLS?

500

This type of attack involves the creation of a fake wireless access point that is designed to look like a legitimate one in order to steal information from users who connect to it.

What is a rogue access point attack?

500

This type of authentication requires a user to provide two or more forms of authentication, such as a password and a fingerprint.

What is multi-factor authentication?

500

The potential risk associated with sharing location data with third-party apps or services.

What is the risk of location tracking and potential invasion of privacy?

M
e
n
u