Cryptography
Parts of a Computer
Threats and Attacks
Authentication
Networking and Protocols
100

The process of converting plaintext into ciphertext.

What is encryption?

100

This is the brain of the computer.

What is the CPU?

100

An attack that tricks users into revealing personal information by using fake emails and messages.

What is phishing?

100

The most common form of authentication.

What is a password?

100

The unique numerical label assigned to each device on a network.

What is an IP address

200

A basic type of cipher that replaces each letter with another letter or symbol.

What is a substitution cipher?

200

This component stores long-term data and files.

What is a hard drive? or SSD

200

Type of malware that locks files and demands a payment.

What is ransomware?

200

Authentication requiring users to provide two separate forms of identification.

What is two-factor authentication?

200

This protocol ensures encrypted communication between your browser and a website, using SSL/TLS.

What is HTTPS?

300

Cipher that shifts letters of the alphabet by a fixed number.

What is a Caesar Cipher.

300

Temporary storage for data that is actively being used.

What is RAM?

300

An attack that tries to guess every possible password.

What is a brute-force attack?

300

Verifies a user's identity using their unique biological traits such as fingerprints, voices, retinas, and facial features.

What is biometric authentication?

300

A device that filters and monitors incoming and outgoing traffic on a network.

What is a firewall?

400

Type of encryption that uses the same key for encryption and decryption.

What is symmetric encryption?

400

This component connects all the parts together to allow them to function.

What is the Motherboard?

400

An attack where many sources flood a system with traffic.

What is a DDoS attack?

400

An electronic document used to prove the validity of a public key.

What is a digital certificate?

400

The main protocol used to transfer files between computers on a network.

What is File Transfer Protocol (FTP)?

500

Encryption method that uses two keys (a public one and a private one).

What is asymmetric encryption?

500

This component supplies power to all the other components.

What is the PSU?

500

A common attack that uses malicious code to access information that was not intended to be displayed.

What is SQL injection?
500

A crucial security measure that determines who is allowed to access specific resources, systems, or physical spaces.

What is access control?

500

What port number is commonly used for secure web traffic.

What is port 443?