The same secret key to encode and to decode a message.
What is symmetric cryptography?
Software that is designed to harm your computer.
What is malware?
1 byte
What is 8 bits?
Websites for a college or university should have this top-level domain.
What is .edu?
8 MOD 2
What is 0?
The study of counting letters or groups of letters in encoded text.
What is frequency analysis?
A security attack in which the victim is tricked into giving up personal information.
What is phishing?
About 1,000,000,000 bytes
What is a Gigabyte?
The system used for translating a web address like www.google.com into an IP address that can be used to connect to the site's server.
What is DNS?
27 MOD 3
What is 0?
The key used to encode the message in asymmetric cryptography.
What is the public key?
A security system that controls the kinds of connections that can be made between a computer or network and the outside world.
What is a firewall?
Data that describes other data.
What is Metadata?
The collection of interlinked website documents that you can view with a web browser.
What is WWW? (The World Wide Web)
10 MOD 24
What is 10?
The key used to shift the letter A to letter C in the Caesar Cipher.
What is key 2?
Sending a lot of requests to a server at the same time to render the target inaccessible.
What is a Denial of Service attack?
RGB color values mimic the human eye by representing colors using 3 values of ____ bits each.
What is 8?
Simulates a reliable, long-term connection between two computers by only displaying data once all packets have arrived.
What is TCP?
29 MOD 3
What is 2?
The layer of security wrapped around network communication to prevent anyone unnecessary from seeing it.
What is TLS/SSL?
When an incorrect IP address is returned by DNS due to corrupt data in its cache.
What is DNS spoofing?
Tiffani has a channel on a popular video sharing site and has over 100 thousand subscribers. After making her latest video and uploading to her channel, she notices that the quality of video better on her home computer than the uploaded version. This is the likely cause of Tiffani’s video quality.
What is lossy compression?
The protocols that are the highest level of abstraction because they manage how data is interpreted and displayed to users.
What is the Application Layer? (Application Layer Protocols)
51 MOD 4
What is 3?