What type of malware demands payment to restore access to files?
Ransomware
What does HTTPS stand for?
Hypertext Transfer Protocol Secure
What is phishing?
A technique to trick users into revealing personal info via fake emails or websites
What does encryption do to data?
Converts it into unreadable form to protect it
What does MFA stand for?
Multi-Factor Authentication
Which malware records keystrokes to steal passwords?
Keylogger
Which protocol secures email communication?
Secure/Multipurpose Internet Mail Extensions (S/MIME)
What is shoulder surfing?
Observing someone’s screen or keyboard to steal credentials
What is the process of converting ciphertext back to plaintext?
Decryption
What is a biometric authentication method?
Fingerprint, face recognition, or retina scan
What is the name of a self-replicating malware that spreads without user action?
Worm
What is the function of a firewall?
To filter and block unauthorized network traffic
What is baiting?
Leaving a tempting item (like a USB drive) to lure someone into compromising security
What encryption method uses the same key to encrypt and decrypt?
Symmetric encryption
What is a token-based authentication method?
A temporary code or device used to verify identity
Which type of malware disguises itself as legitimate software?
Trojan Horse
What protocol is used to securely access a remote computer?
SSH (Secure Shell)
What type of attack targets a specific person using personalized information?
Spear phishing
Which encryption method uses a public and private key pair?
Asymmetric encryption
What is the difference between authentication and authorization?
Authentication verifies identity; authorization grants access
What do we call malware that gives an attacker remote control of a system?
Remote Access Trojan (RAT)
Which network protocol uses encryption and operates at Layer 3?
IPsec
What is pretexting?
Creating a fabricated scenario to trick someone into revealing information
What is the main advantage of asymmetric encryption over symmetric?
It doesn’t require secure key exchange
What is single sign-on (SSO)?
A system allowing one login to access multiple applications