10 Quiz Flashcards
1
Q
Encryption
A
2
Q
- Converts data into secret code to keep it private; only authorized users can decrypt.
A
3
Q
Decryption
A
4
Q
- Reverses encryption to reveal the original message (plaintext).
A
5
Q
Symmetric Key Encryption
A
6
Q
- Same key is used to encrypt and decrypt (e.g.
A
Caesar cipher).
7
Q
Asymmetric / Public Key Encryption
A
8
Q
- Uses a public key to encrypt and a private key to decrypt; more secure (e.g.
A
Alice & Bob).
9
Q
Computationally Hard
A
10
Q
- A problem that takes an unreasonable amount of time to solve-can’t be cracked easily.
A
11
Q
Phishing
A
12
Q
- Tricking people into giving up private info (like passwords) through fake messages.
A
13
Q
Keylogging
A
14
Q
- Software that records every key you press to steal sensitive information.
A
15
Q
Malware
A
16
Q
- Malicious software that damages or controls your system (e.g.
A
viruses
17
Q
Rogue Access Point
A
18
Q
- A fake Wi-Fi hotspot used to gain unauthorized access to a secure network.
A
19
Q
Spoofing Attack
A
20
Q
- Faking an identity (like a trusted email) to trick the user.
A
21
Q
Multi-Factor Authentication (MFA)
A
22
Q
- Requires 2+ types of evidence to log in: something you know
A
have
23
Q
Certificate Authority (CA)
A
24
Q
- Trusted org that issues SSL certificates to prove a site is secure (shows [lock icon] icon in
A
25
Q
browser).
A
26
Q
Personally Identifiable Information (PII)
A
27
Q
- Any data that can identify you (name
A
address
28
Q
Computing Innovation
A
29
Q
- A new tool or process that relies on computer code (like smartphones
A
AI
30
Q
Legal and Ethical Concerns
A
31
Q
- Arise when technology harms people
A
invades privacy
32
Q
Cookies
A
33
Q
- Small files websites store on your device to remember you and your preferences.
A
34
Q
Geolocation
A
35
Q
- Technology (like GPS or IP address) used to track the location of devices.
A