Unit 1:
Unit 2:
Unit 3:
Basic Cybersecurity Knowledge
Potpourri
100

Three to four characters at the end of a file name that lets the computer know what program to open:

What is a File Extension?

100

This was used to communicate messages secretly and required a key - usually 3.

What is the Caesar cipher?

100

This is the software that helps direct the hardware of a computer.

What is an operating system?

100

This is a program that replicates itself and spreads from computer to computer, often causing harm.

What is a computer virus?

100

Savannah, GA

What was the first state capital of Georgia?

200

When a user receives an email with a rapidly approaching expiration period that pressures them to respond, to click a link, or to take an action involving personal information to win a prize

What is phishing?

200

This type of attack attempts every possible key until the correct one is found.

What is a brute force attack?

200

Think of this as the colorful screen with bells and whistles that allows users to navigate computers easily.

What is a graphical user interface?

200

This is the term we use to describe all the characters that *should* be used to create a strong password.

What is complexity?

200

This sea creature has 3 hearts.

What is an octopus?

300

The ability of machines to perform tasks that normally require human intelligence.

What is artificial intelligence?

300

This encryption method uses two keys: one public and one private.

What is asymmetric encryption?

300

Robert and Liam live in different cities but work for the same company. They need to meet weekly and communicate often. If they email or make group voice or video calls, these applications are usually referred to as this.

What is collaboration software?

300

To prevent unauthorized access, you should always do this when leaving your computer unattended.

What is lock your screen?

300

This is the name for a large group of ravens.

What is a murder?

400

The 3 A's of AAA framework.

Authentication
Accounting
Authorization

400

This type of attack intercepts and alters communication between two parties without their knowledge.

What is a man-in-the-middle attack?

400

This is how we describe the differences in users having access to high speed internet and those who do not. It may be caused by geography, poverty, and equitable access issues.

What is the digital divide?

400

This type of hacker works legally to test and improve security systems.

What is an ethical hacker or white hat hacker?

400

Over 60% of the world's lakes are located in this country.

What is Canada?

500

This is represented by something you are, something you have, and something you know.

What is multi-factor authentication?

500

his popular technology ensures secure web browsing by encrypting communications between a user and a website.

What is HTTPS (Hypertext Transfer Protocol Secure)?

500

On the Windows operating system, this is the text-based application that allows users to navigate a computer without use of a GUI.

What is Command Line Interface?

500

The weakest link when it comes to day to day cybersecurity in business.

Who are the employees?

500
  • Google Images was created after this famous singer and actress wore the green dress at the 2000 Grammys.

Who is Jennifer Lopez?

M
e
n
u