It's Cryptic
Security!
Bits & Bytes
Nothing But 'Net
MODern Warfare
100

The same secret key to encode and to decode a message.

What is symmetric cryptography?

100

Software that is designed to harm your computer.

What is malware?

100

1 byte

What is 8 bits?

100

Websites for a college or university should have this top-level domain.

What is .edu?

100

8 MOD 2

What is 0?

200

The study of counting letters or groups of letters in encoded text.

What is frequency analysis?

200

A security attack in which the victim is tricked into giving up personal information.

What is phishing?

200

About 1,000,000,000 bytes

What is a Gigabyte?

200

The system used for translating a web address like www.google.com into an IP address that can be used to connect to the site's server.

What is DNS?

200

27 MOD 3

What is 0?

300

The key used to encode the message in asymmetric cryptography.

What is the public key?

300

A security system that controls the kinds of connections that can be made between a computer or network and the outside world.

What is a firewall?

300

Data that describes other data.

What is Metadata?

300

The collection of interlinked website documents that you can view with a web browser.

What is WWW? (The World Wide Web)

300

10 MOD 24

What is 10?

400

The key used to shift the letter A to letter C in the Caesar Cipher.

What is key 2?

400

Sending a lot of requests to a server at the same time to render the target inaccessible.

What is a Denial of Service attack?

400

RGB color values mimic the human eye by representing colors using 3 values of ____ bits each.

What is 8?

400

Simulates a reliable, long-term connection between two computers by only displaying data once all packets have arrived.

What is TCP?

400

29 MOD 3

What is 2?

500

The layer of security wrapped around network communication to prevent anyone unnecessary from seeing it.

What is TLS/SSL?

500

When an incorrect IP address is returned by DNS due to corrupt data in its cache.

What is DNS spoofing?

500

Tiffani has a channel on a popular video sharing site and has over 100 thousand subscribers. After making her latest video and uploading to her channel, she notices that the quality of video better on her home computer than the uploaded version. This is the likely cause of Tiffani’s video quality.

What is lossy compression?

500

The protocols that are the highest level of abstraction because they manage how data is interpreted and displayed to users.

What is the Application Layer? (Application Layer Protocols)

500

51 MOD 4

What is 3?