(Blank)
(Blank)
(Blank)
(Blank)
100

what does WWW stand for

World Wide Web

100

what is digital currency

an accepted form of currency to pay for goods an services. 

examples of digital currencies are PayPal, Apple pay, and Gopay

100

define hacking

the act of gaining illegal access to a computer system without the users permission.
100

what is two-step verification

requires two methods of authentication before making a purchase or logging in an account 

usually the second method is receiving code via mail or phone

200

what does URL stand for 

Uniform Resource Locator

200

what is a block chain

decentralized database to store transaction made by networked members  

200

the difference between phishing and pharming

....

200

what is adware 

adware is a type of malware that attempts to flood the user with unwanted ads

300

two types of cookies

session cookies

persistent[permanent] cookies

300

name three cyber security threat

>>brute force attacks.

>>data interception

>>distributed denial of service [DDOS] attack

>>hacking

>>malware

>>phishing

>>pharming

>>social engineering

300

what is SSL certificate

a form of digital certificate to authenticate a website

300

what does a DDOS[Distributed Denial of Service] attack do 

it prevents users to access part of a network 

one method to do DDoS attack is by spamming and the spammed messages will be in traffic

400

what is  Hyper transfer protocol [HTTP]

rules when transferring files across the internet

400

how do hackers do brute force 

hacker will try common combination of letters or number until they find the password 

such passwords are [12345678] , [asdfghjkl]

400

what are the 4 biometric technique

>>fingerprint

>>retina scans

>>face recognition

>>voice recognition

400

what is the four stages when a cybercriminal targets an individual using social engineering 

1. gather information and decide method

2. victim is being targeted

3. the cybercriminal will attack the victim 

4after the cybercriminals are done they will remove all traces of malware to cover their track

500

3 Difference between internet and WWW

internet

users can send and receive emails.

allow online chatting[via text, audio ,and video].

make and use of transmission protocols [TCP] and internet protocols [IP].

it is a worldwide collection of interconnected networks and devices.

WWW

it is a collection of multimedia web pages and other information on websites.

uniform resource locators are used to specify the location of the web pages.

web resources are accessed by web browsers.

uses internet to access information from web servers.


500

name 5 types of malware 

>>viruses

>>ransomware

>>adware

>>spyware

>>trojan horse

>>worms

500

name 5 way to prevent cyber threat

>>anti-malware 

>anti-virus

>>authentication

>>passwords and user name

>>biometric

>>two step authentication

>>firewall


500

what are the 5 social engineering examples

>>instant messaging

>>scareware

>>emails/phishing scams

>>baiting

>>phone calls