Cybersecurity Basics
Cryptography 101
Coding Basics
Computer Hardware
Key Vocabulary
100

What is a virus that self-replicates and spreads to other computers?

A worm

100

What does VPN stand for?

Virtual Private Network

100

What is the process of converting plaintext into ciphertext for secure communication?

Encryption

100

What is the main function of a firewall in cybersecurity?

To monitor and control incoming and outgoing network traffic based on security rules

100

What is the meaning of "phishing" in cybersecurity?

Phishing is a type of cyber attack where attackers impersonate legitimate entities to deceive individuals into revealing sensitive information.

200

Why is it important to use strong and unique passwords for online accounts?

To enhance security and prevent unauthorized access

200

What is the purpose of using asymmetric encryption in cybersecurity?

To provide secure communication by using public and private key pairs

200

What programming language is commonly used for web development?

HTML, CSS, JavaScript, etc.

200

What is the difference between RAM and ROM in a computer?

RAM is volatile memory used for data storage during operation, while ROM is non-volatile memory used for permanent storage.

200

What is the significance of "malware" in cybersecurity?

  • Malware is malicious software designed to damage or gain unauthorized access to computer systems. It includes viruses, worms, ransomware, and spyware.



300

How can you identify phishing emails and protect yourself from phishing attacks?

By checking sender's email address, avoiding clicking on suspicious links, and verifying requests for sensitive information

300

What is the difference between symmetric and asymmetric encryption?

Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses key pairs for encryption and decryption.

300

What is the role of loops in coding?

Loops are used to repeat a block of code until a certain condition is met.

300

Why is it important to keep software and operating systems updated for cybersecurity?

To patch vulnerabilities and protect against known security threats

300

What is the definition of "firewall" in cybersecurity?

  • A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.



400

Define two-factor authentication and explain why it is more secure than single-factor authentication.

Two-factor authentication requires two forms of verification to access an account, making it harder for unauthorized users to gain access

400

How does a Caesar cipher work in cryptography?

It shifts the alphabet by a fixed number of positions to encrypt and decrypt messages.

400

What are variables and why are they important in programming?

Variables are placeholders for storing data, and they are important for storing and manipulating information in programs.

400

How does a VPN enhance cybersecurity when browsing the internet?

By encrypting internet traffic and masking the user's IP address for privacy and security

400

What is the meaning of "encryption" in cybersecurity?

  • Encryption is the process of converting plaintext into ciphertext to secure data and communications from unauthorized access. It uses algorithms and keys to encode and decode information.



500

What are common types of cyber threats that individuals and organizations face?

Malware, phishing, ransomware, DDoS attacks, etc.

500

Explain the concept of public and private keys in encryption.

Public keys are used for encryption, while private keys are used for decryption in asymmetric encryption algorithms.

500

How can arrays be used in coding to store multiple values?

Arrays are used to store multiple values of the same data type in a single variable.

500

What are some physical security measures to protect computer hardware from theft or damage?

Locks, alarms, security cables, biometric access controls, etc.

500

What is the significance of "authentication" in cybersecurity?


  • Authentication is the process of verifying the identity of a user or system to ensure that only authorized individuals can access resources or information. It typically involves credentials, biometrics, or multi-factor authentication methods.

Copy
Export
Read Aloud
More



M
e
n
u