Network Security Protocols
Types of Malware
Social Engineering Techniques
Encryption Basics
Authentication Methods
100

What does HTTPS do that HTTP doesn’t?

A: It encrypts your data—like putting your info in a secret envelope!

100

Which malware pretends to be helpful but bites you later?

A Trojan horse—sneaky and dramatic!

100

If someone calls pretending to be IT and asks for your password, what’s that called?

Phishing—don’t take the bait!

100

What’s the name of the process that turns readable info into secret code?

Encryption

100

Which is safer: a password, a fingerprint, or both?

both! That’s called multi-factor authentication—double the trouble for hackers!

200

What protocol secures Wi-Fi connections at home?

WPA2

200

What is a worm?

It locks your files and demands cash to get them back.


200

What is pretexting?


This technique lures you with a “freebie” that actually contains malware.


200

What is symmetric encryption?


This method uses one key to lock and a different key to unlock.


200

What are something you know, something you have, and something you are?


these are the 3 pillars of multi-factor authentication.


300

What does a firewall do?

Blocks unwanted traffic

300

What is ransomware?


It looks friendly but hides malware inside.


300

What is baiting?


This tactic gets attackers past physical security by following employees in.


300

What is asymmetric encryption?


this file proves a website is trustworthy and secure.


300

 What is biometric authentication?


This type of login uses your fingerprint or face.


400

Which protocol secures emails with encryption?

SSL/TLS

400

What is a Trojan horse?


It watches you without your permission, stealing info.


400

What is tailgating?


A super-targeted phishing attack, just for you.


400

What is a digital certificate?


These keep data safe by turning it into a fixed-length code.


400

What is a one-time password (OTP)?


this password type changes every time you log in.


500

What’s the main job of a VPN?

Hides your online moves

500

What is spyware?


This sneaky malware hides in your system and gives attackers control.


500


What is spear phishing?


A super-targeted phishing attack, just for you.


500

What is a hash function?


In encryption, this determines how strong your key is.


500

What are authentication tokens?

These are devices or codes that prove you're the real user.