What protocol is used to secure websites via HTTPS?
TLS (Transport Layer Security)
What type of malware demands payment to unlock data?
Ransomware
What is phishing?
A scam to steal information via fake emails or websites
What is encryption?
Converting data into a secret code
What is two-factor authentication (2FA)?
Two steps to verify identity
What is the purpose of a firewall?
To block unauthorized access
What does a worm do?
Spreads itself across networks
What is pretexting in cybersecurity?
Creating a false scenario to steal data
What is a cipher?
A method of encrypting text
What is biometric authentication?
Using physical traits like fingerprint or face
What does a VPN do?
Encrypts your internet connection
What malware records keystrokes?
Keylogger
What is baiting?
Offering something enticing to trick the victim
What does a public key do?
Encrypts data
What is a password manager?
A tool to store and generate passwords
What is the function of a proxy server?
Acts as a gateway between a user and the internet
What’s a botnet?
A network of infected computers controlled remotely
What is the goal of social engineering?
To manipulate people into giving up confidential information
What is end-to-end encryption?
Only sender and receiver can read the message
What is MFA?
Multi-Factor Authentication
Which protocol is used for securely transferring files?
SFTP (Secure File Transfer Protocol)
What is adware?
Malware that displays unwanted ads
What’s spear phishing?
A targeted phishing attack at a specific person
What’s the difference between symmetric and asymmetric encryption?
Symmetric uses one key; asymmetric uses two
What is CAPTCHA used for?
To verify a human is using the system