When personal information like Social Security numbers or credit card data is exposed through a security breach, this type of information is classified by what three-letter acronym that stands for Personally Identifiable Information?
PII
Cybercriminals often create fake websites or emails that appear legitimate to trick users into revealing passwords or personal information. This deceptive technique, named after a type of fishing, is called what?
Phishing
In basic cryptography, the original readable message before it's converted into secret code is called plaintext, while the scrambled, unreadable version is called what?
Ciphertext
Network administrators install security devices that monitor incoming and outgoing traffic and block unauthorized access based on predetermined rules. These network barriers are called what?
Firewalls
What are the steps you should take if you think your computer has been infected with malware?
Close the window, exit the browser, run antivirus software, and check for updates
A security approach that requires users to verify their identity using two or more independent factors, such as a password and a one-time code.
What is multi-factor authentication (MFA)?
Attackers sometimes flood a network or server with an overwhelming amount of traffic to make it unavailable to legitimate users. This type of attack that aims to deny service is abbreviated as what?
DoS
Modern secure communications rely on encryption systems where two different but mathematically related keys are used - one for encryption and another for decryption. This cryptographic approach is called what type of key cryptography?
Public key
To protect sensitive data traveling over public networks like the Internet, organizations create encrypted tunnels that allow secure remote access to private networks. These secure connections are abbreviated as what?
VPN
What tools can be used to prevent malware from entering your computer?
Antivirus software, firewall protection, and Windows SmartScreen
Security professionals often refer to the three core principles that form the foundation of information security: ensuring data accuracy, preventing unauthorized access, and maintaining system availability. What acronym represents these three principles?
CIA
Malicious software that appears to be legitimate but actually contains hidden harmful code, named after a famous military deception from ancient Greece, is called what?
Trojan
To ensure data hasn't been tampered with during transmission, cryptographic systems generate a unique digital fingerprint of the original message. This verification mechanism is called a what?
Hash
A system that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
What is a firewall?
What happens when a file has a double file extension?
The file will function based on the last extension listed.
The practice of giving users only the minimum level of access necessary to perform their job functions.
What is the principle of least privilege?
In this sophisticated attack method, cybercriminals position themselves between two communicating parties to intercept and potentially alter communications without either party knowing. What is this interception technique called?
Man in the middle
The current standard for symmetric encryption, adopted by the U.S. government in 2001 to replace DES, uses 128-bit, 192-bit, or 256-bit keys and is known by what three-letter acronym?
AES
When wireless networks broadcast their presence, they identify themselves with a name that users see when searching for available WiFi connections. This network identifier is called what?
SSID
How can a user verify if a file has a double file extension?
By right-clicking the file and opening it with edit to view the extensions
Advanced persistent threats represent sophisticated, long-term cyberattacks typically sponsored by nation-states or organized crime groups that silently infiltrate networks for extended periods. These complex attacks are commonly abbreviated as what?
APT
When attackers exploit vulnerabilities that software developers haven't yet discovered or patched, they're using what type of exploit that refers to the number of days developers have had to create a fix?
In quantum cryptography research, scientists worry that future quantum computers could break current encryption methods by efficiently solving the mathematical problems that make today's cryptography secure. This potential threat is called quantum what?
Supremacy
What is a method used to secure data transmission and reduce the risk of interception on unsecured networks?
Encrypting data in transit using protocols like HTTPS or TLS to prevent interception on public networks.
What is one of the first actions you should take after suspecting malware infection?
Running antivirus software.