10 Quiz Flashcards
1
Q
Encryption
A
2
Q
- Converts data into secret code to keep it private; only authorized users can decrypt.
A
3
Q
Decryption
A
4
Q
- Reverses encryption to reveal the original message (plaintext).
A
5
Q
Symmetric Key Encryption
A
6
Q
- Same key is used to encrypt and decrypt (e.g.
A
Caesar cipher).
7
Q
Asymmetric / Public Key Encryption
A
8
Q
- Uses a public key to encrypt and a private key to decrypt; more secure (e.g.
A
Alice & Bob).
9
Q
Computationally Hard
A
10
Q
- A problem that takes an unreasonable amount of time to solve-can’t be cracked easily.
A
11
Q
Phishing
A
12
Q
- Tricking people into giving up private info (like passwords) through fake messages.
A
13
Q
Keylogging
A
14
Q
- Software that records every key you press to steal sensitive information.
A
15
Q
Malware
A
16
Q
- Malicious software that damages or controls your system (e.g.
A
viruses
17
Q
Rogue Access Point
A
18
Q
- A fake Wi-Fi hotspot used to gain unauthorized access to a secure network.
A
19
Q
Spoofing Attack
A
20
Q
- Faking an identity (like a trusted email) to trick the user.
A
21
Q
Multi-Factor Authentication (MFA)
A
22
Q
- Requires 2+ types of evidence to log in: something you know
A
have
23
Q
Certificate Authority (CA)
A
24
Q
- Trusted org that issues SSL certificates to prove a site is secure (shows [lock icon] icon in
A
25
browser).
26
Personally Identifiable Information (PII)
27
- Any data that can identify you (name
address
28
Computing Innovation
29
- A new tool or process that relies on computer code (like smartphones
AI
30
Legal and Ethical Concerns
31
- Arise when technology harms people
invades privacy
32
Cookies
33
- Small files websites store on your device to remember you and your preferences.
34
Geolocation
35
- Technology (like GPS or IP address) used to track the location of devices.