This principle ensures that only authorized individuals can access sensitive information.
What is Confidentiality?
This open-source operating system, developed as a Unix-like system, is widely used in servers, desktops, and embedded systems.
What is Linux?
Cybercriminals gather information from these sources to personalize phishing emails and make them more convincing.
What are social media and professional networking sites?
The Term Wi-Fi stands for ____.
What is Wireless Fidelity?
What does this line of code print out?
x = 0
for i in range(10):
x += 1
print(x)
What is 10?
The acronym CIA Triad stands for ____ , ____ , ____.
What is Confidentiality, Integrity, and Availability.
What is a command line for you to switch directories?
What is CD?
An employee receives a text message claiming to be from their bank, stating that there has been suspicious activity on their account and providing a link to resolve the issue. What type of phishing attack is this?
What is smishing?
A firewall is a security device that monitors and controls ____ traffic.
What is network?
This person was the first person that started writing algorithms in 1851
Who is Ada Lovelace?
In a hypothetical scenario, a company's website experiences a surge in traffic due to a viral marketing campaign, causing the website to slow down significantly. Despite this, the website remains accessible to users, albeit with some delays. Which aspect of the CIA Triad is most relevant in this scenario?
What is "availability"?
This field of study enables you to retrieve data from a Linux system hard drive after it has been deleted?
What is data forensics?
What is a common way to identify a phishing email?
What is the email asks for personal information
What is the name of the cyberattack where lots of computers are hijacked to make multiple fake requests to a company's webserver in order to crash the server?
What is DDoS attack?
Something you should look for when on an online check out page
What is “https”/a lock screen
Data tampering and unauthorized alterations compromise this principle of the CIA Triad.
What is Integrity?
This command-line utility, used for searching and manipulating text within files or streams, is a powerful tool for Linux users and administrators.
What is Grep?
Small, unknown retailers are generally most trustworthy to purchase items from over the net. True or false
What is False?
If you cannot connect to the browser, but your network is functional, what is likely experiencing an issue at the moment?
What is DNS?
_____ uses this three-way handshake process to establish a connection between a client and server before data transmission can occur.
What is TCP?
You log in to your online grade portal and realize that in addition to your grades, you can see grades for everyone in your class.
What is confidentiality?
In linux, there is a command line called su and sudo what's the difference?
"sudo" allows users to execute commands with the privileges of another user, usually the root user, after providing their own password. "su" allows users to switch to another user account, including the root user, after providing the target user's password.
An employee receives an email from what appears to be their bank, claiming that their account has been compromised and urging them to click on a link to verify their account details. The email contains the bank's logo and uses urgent language to prompt immediate action. What type of phishing attack is this?
What is Spear phishing?
What layer of the OSI model is Wi-Fi?
What is Layer 1?
What are the names in everyone in the room? (Cannot get 1 wrong unless it's Michael's then it is fine)
Who are Jonathan,Michael,Gregory, Elvis, Howard,Pranava, Dylan, Parker, Ethan, Tessa, Jasper, Kyvan?