Internet
Privacy
Cybersecurity #1
Cybersecurity #2
Cybersecurity #3
100

widely agreed upon set of rules that standardize communication between machines

What is Protocol?

100

Sharing a friend's song with permission is considered to be s _ _ _

safe

100

Illegal copying and selling of DVDs and CDs is called...

Piracy

100

A Creative Commons license lets people use an entire piece of work for educational purposes. True or False?

What is True

100

What is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet?

Caesar Cipher

200

The Internet is non-existent in the developing world

What is False?

200

Multiple paths exist between any two points

What is redundancy?

200

In a database, columns and rows correspond to

What is attributes and records?

200

Confidentiality, Availability, and Integrity are?

What is the CIA Triad?

200

What you need to look for is you are to use a credit card online...

Encryption or being certified secure.

300

Makes sure that each request is forwarded to its intended recipent

What is a router?

300

Protocol that defines the structure of the internet address and assigns a unique address to every device on the internet

What is IP or Internet Protocol?

300

Answer the following modulo math problem.

35 mod 6

What is 5?

300

Protocol allows for sending multiple packets between two computers by checking all packets arrived and they can be put back together in a proper order

What is TCP?

300

A company's server is flooded with data until it can no longer cope with volume, rendering the server unreachable.  

What is DDoS?

400

network connecting individual networks

What is the Internet?

400

A responsible way to use other people's work is to:

What is give credit to the creator.

400

Ability to provide data transmission even when some connections between routers have failed

What is fault-tolerant routing?

400

_________ is someone who sees cyberbullying happening, but does nothing to help.

bystander
400

Brute force and letter frequency analysis

How to crack a Caesar Cipher?
500

Time it takes for a bit to travel from a sender to a receiver

What is latency?

500

Felecia discovers that she can log into her teacher’s online gradebook and changes her grades.

Which part of the CIA triad was broken?

What is Integrity?
500

Saar sets a password to gain access to his phone. His little brother figures it out and gets into his apps.

Which part of the CIA triad was broken?

What is confidentiality?

500

small part of digital message, and metadata about the message, including where it came from and where it is going

What is a packet?

500

Penetration testing for a company

What is  legal hacking?

M
e
n
u