Three to four characters at the end of a file name that lets the computer know what program to open:
What is a File Extension?
This was used to communicate messages secretly and required a key - usually 3.
What is the Caesar cipher?
This is the software that helps direct the hardware of a computer.
What is an operating system?
This is a program that replicates itself and spreads from computer to computer, often causing harm.
What is a computer virus?
Savannah, GA
What was the first state capital of Georgia?
When a user receives an email with a rapidly approaching expiration period that pressures them to respond, to click a link, or to take an action involving personal information to win a prize
What is phishing?
This type of attack attempts every possible key until the correct one is found.
What is a brute force attack?
Think of this as the colorful screen with bells and whistles that allows users to navigate computers easily.
What is a graphical user interface?
This is the term we use to describe all the characters that *should* be used to create a strong password.
What is complexity?
This sea creature has 3 hearts.
What is an octopus?
The ability of machines to perform tasks that normally require human intelligence.
What is artificial intelligence?
This encryption method uses two keys: one public and one private.
What is asymmetric encryption?
Robert and Liam live in different cities but work for the same company. They need to meet weekly and communicate often. If they email or make group voice or video calls, these applications are usually referred to as this.
What is collaboration software?
To prevent unauthorized access, you should always do this when leaving your computer unattended.
What is lock your screen?
This is the name for a large group of ravens.
What is a murder?
The 3 A's of AAA framework.
Authentication
Accounting
Authorization
This type of attack intercepts and alters communication between two parties without their knowledge.
What is a man-in-the-middle attack?
This is how we describe the differences in users having access to high speed internet and those who do not. It may be caused by geography, poverty, and equitable access issues.
What is the digital divide?
This type of hacker works legally to test and improve security systems.
What is an ethical hacker or white hat hacker?
Over 60% of the world's lakes are located in this country.
What is Canada?
This is represented by something you are, something you have, and something you know.
What is multi-factor authentication?
his popular technology ensures secure web browsing by encrypting communications between a user and a website.
What is HTTPS (Hypertext Transfer Protocol Secure)?
On the Windows operating system, this is the text-based application that allows users to navigate a computer without use of a GUI.
What is Command Line Interface?
The weakest link when it comes to day to day cybersecurity in business.
Who are the employees?
Who is Jennifer Lopez?