Internet and Network Basics
Malware & Attacks
Security Protocols
Authentication & Access Control
Cryptography

100

Smart devices like thermostats, doorbells, and fridges that connect to the internet are part of this concept.

Internet of things (IoT)

100

Malicious software designed to harm systems.

Malware

100

Protocol that encrypts web traffic, preventing attackers from reading data in transit

HTTPS

100

What does MFA stand for?

Multi-factor authentication

100

This cipher is named after an ancient Roman Leader that used a simple substitution cipher by shifting letters by 3 positions.

Julius Caesar

200

What is the difference between HTTP and HTTPS? Explain.

HTTPS is more secure than HTTP because it uses encryption to protect data.

200

Malware that replicates itself to spread across networks.

Worm

200

Protocol that secures remote logins with encryption

SSH

200

Using something you know (password), something you have (phone) and something you are (fingerprint) are examples of different authentication ____?

Factors

200

This type of encryption uses a public key and private key for encryption and decryption.

Asymmetric Encryption

300

A network that connects devices within a limited area like a home or school is called ______.

a LAN

300

Malware disguised as legitimate software.

Trojan horse

300

Email protocol that is mainly used to send outgoing mail

SMTP

300

A code sent to your phone after you enter your password is an example of what type of authentication?

Two factor authentication

300

This French cipher uses a key word to shift letters multiple times, making it much stronger than a Caesar cipher.

Vigenere Cipher

400

Online gaming lag is often caused by low bandwidth or high ____?

Latency  

(Latency = measured how long it takes for data to travel from the source to the destination vs. Bandwidth = the maximum volume of data that can be transmitted over a network per second)

400

An attack that overwhelms a website with traffic from many computers.

Distributed Denial-of-Service (DDoS) attack

400

Tunneling protocol used to support connections to VPNs, but does not encrypt data on its own.

L2TP

400

What is the difference between authentication and authorization?

Authentication verifies who you are. Authorization determines what your are allowed to access

400

While hashes can be used for security, this simple type of sum is designed only for error detection.

Checksum

500

When you type a website into your browser, explain the role of DNS and IP addresses in getting you to that site.

DNS translates the domain name into an IP address, and the IP address is used to locate and connect to the correct server.

500

Malware that secretly records keystrokes to steal sensitive information.

Keylogger

500

Protocol used primarily in Windows to remotely control another computer via a graphical interface

RDP

500

An attacker steals a user’s session ID to impersonate them without needing their password. What type of attack is this?

Session hijacking

500

In symmetric cryptography, the key used by the sender and receiver is ______.

Shared