I'm online and I meet someone in a chat room. Is it OK to give that person my address or phone number?
What is NO!
How long should a password be to be considered secure?
What is sixteen characters or more.
Cybersecurity is the protection of _______ systems and networks.
What is computer.
Their sole purpose is to label and store data in memory.
What is variable.
The freedom from interference or intrusion.
What is privacy.
Information on the Internet can always be trusted to be factual. It wouldn’t be online if it wasn’t true. TRUE or FALSE?
What is FALSE.
What is FALSE.
What is confidentiality, integrity, and availability.
List the 5 common data types.
What is integer, float, character, string, boolean.
A collection of facts, numbers, words, measurements, or observations.
What is data.
What percentage of teens respond to strangers (via email, SMS, instant message) online?
a. 25% b. 63% c. 88%
What is B.
Passwords should include the following:
What is uppercase and lowercase letters, special characters, and numbers.
Software that is designed to intentionally cause damage to a computer, server, or network.
What is Malware.
{
printf("%d", i);
}
What is printed out?
Text files with small pieces of data. (ex. username and password)
What is cookies.
How old do you have to be to have a Facebook, Instagram, Twitter and Snapchat account?
What is 13.
I can replace letters that look like specific ______ to make my password stronger.
What is numbers.
Name a career in cybersecurity.
What is a Pentester, Network Security Administrator, Cybersecurity Analyst, Security Engineer, Digital Forensics Analyst, etc.
An _____ statement is used to check a condition.
What is the private browsing mode called in Chrome?
What is Incognito.
To get to an Incognito browser press Ctrl + Shift + n.
The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
What is cyberbullying.
The attacker tries a list of known or commonly used passwords. This is called a ______ Attack.
What is Dictionary Attack.
Name one cyber attack and explain it.
What is Malware, Phishing, Denial of Service, XSS attack, etc.
Modules of code that accomplish a specific task.
What is functions.
This creates an encrypted tunnel for data and protects your online identity by hiding your IP address.
What is VPN.
Virtual Private Network