10 Quiz Flashcards

1
Q

Encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Converts data into secret code to keep it private; only authorized users can decrypt.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Decryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Reverses encryption to reveal the original message (plaintext).
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric Key Encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Same key is used to encrypt and decrypt (e.g.
A

Caesar cipher).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric / Public Key Encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Uses a public key to encrypt and a private key to decrypt; more secure (e.g.
A

Alice & Bob).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computationally Hard

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • A problem that takes an unreasonable amount of time to solve-can’t be cracked easily.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Tricking people into giving up private info (like passwords) through fake messages.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Keylogging

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Software that records every key you press to steal sensitive information.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Malicious software that damages or controls your system (e.g.
17
Q

Rogue Access Point

18
Q
  • A fake Wi-Fi hotspot used to gain unauthorized access to a secure network.
19
Q

Spoofing Attack

20
Q
  • Faking an identity (like a trusted email) to trick the user.
21
Q

Multi-Factor Authentication (MFA)

22
Q
  • Requires 2+ types of evidence to log in: something you know
23
Q

Certificate Authority (CA)

24
Q
  • Trusted org that issues SSL certificates to prove a site is secure (shows [lock icon] icon in
25
Q

browser).

26
Q

Personally Identifiable Information (PII)

27
Q
  • Any data that can identify you (name
28
Q

Computing Innovation

29
Q
  • A new tool or process that relies on computer code (like smartphones
30
Q

Legal and Ethical Concerns

31
Q
  • Arise when technology harms people
A

invades privacy

32
Q

Cookies

33
Q
  • Small files websites store on your device to remember you and your preferences.
34
Q

Geolocation

35
Q
  • Technology (like GPS or IP address) used to track the location of devices.