Safe Computing - AP Computer Science Principles
Card 1 of 30
What is the main function of antivirus software?
What is the main function of antivirus software?
Tap to reveal answer
To detect, prevent, and remove malware. Software that protects computers by identifying and eliminating malicious programs.
To detect, prevent, and remove malware. Software that protects computers by identifying and eliminating malicious programs.
← Didn't Know|Knew It →
What is the primary purpose of a firewall in computing?
What is the primary purpose of a firewall in computing?
Tap to reveal answer
To block unauthorized access to or from a private network. Acts as a barrier between trusted internal and untrusted external networks.
To block unauthorized access to or from a private network. Acts as a barrier between trusted internal and untrusted external networks.
← Didn't Know|Knew It →
What is a strong password characteristic?
What is a strong password characteristic?
Tap to reveal answer
Includes a mix of letters, numbers, and symbols. Complexity makes passwords harder to crack through brute force attacks.
Includes a mix of letters, numbers, and symbols. Complexity makes passwords harder to crack through brute force attacks.
← Didn't Know|Knew It →
Which type of malware encrypts files and demands a ransom?
Which type of malware encrypts files and demands a ransom?
Tap to reveal answer
Ransomware. Encrypts victim's files and demands payment for the decryption key.
Ransomware. Encrypts victim's files and demands payment for the decryption key.
← Didn't Know|Knew It →
What is a sandbox in computing security?
What is a sandbox in computing security?
Tap to reveal answer
An isolated environment to run untested code safely. Isolated execution prevents malicious code from affecting the main system.
An isolated environment to run untested code safely. Isolated execution prevents malicious code from affecting the main system.
← Didn't Know|Knew It →
Identify the practice of regularly backing up data.
Identify the practice of regularly backing up data.
Tap to reveal answer
Data Backup. Creates copies to restore data after corruption, deletion, or attacks.
Data Backup. Creates copies to restore data after corruption, deletion, or attacks.
← Didn't Know|Knew It →
What is the primary purpose of a firewall in computing?
What is the primary purpose of a firewall in computing?
Tap to reveal answer
To block unauthorized access to or from a private network. Acts as a barrier between trusted internal and untrusted external networks.
To block unauthorized access to or from a private network. Acts as a barrier between trusted internal and untrusted external networks.
← Didn't Know|Knew It →
Which term describes malicious software designed to harm or exploit?
Which term describes malicious software designed to harm or exploit?
Tap to reveal answer
Malware. Software designed to damage, disrupt, or gain unauthorized access to systems.
Malware. Software designed to damage, disrupt, or gain unauthorized access to systems.
← Didn't Know|Knew It →
Identify the term for unauthorized access to a computer system.
Identify the term for unauthorized access to a computer system.
Tap to reveal answer
Hacking. Gaining access to systems without permission to steal or damage data.
Hacking. Gaining access to systems without permission to steal or damage data.
← Didn't Know|Knew It →
What is the main function of antivirus software?
What is the main function of antivirus software?
Tap to reveal answer
To detect, prevent, and remove malware. Software that protects computers by identifying and eliminating malicious programs.
To detect, prevent, and remove malware. Software that protects computers by identifying and eliminating malicious programs.
← Didn't Know|Knew It →
What is a strong password characteristic?
What is a strong password characteristic?
Tap to reveal answer
Includes a mix of letters, numbers, and symbols. Complexity makes passwords harder to crack through brute force attacks.
Includes a mix of letters, numbers, and symbols. Complexity makes passwords harder to crack through brute force attacks.
← Didn't Know|Knew It →
Which protocol is used to secure data transmission over the internet?
Which protocol is used to secure data transmission over the internet?
Tap to reveal answer
HTTPS. HTTP Secure encrypts data between browser and server using SSL/TLS.
HTTPS. HTTP Secure encrypts data between browser and server using SSL/TLS.
← Didn't Know|Knew It →
Identify the term for unsolicited bulk email.
Identify the term for unsolicited bulk email.
Tap to reveal answer
Spam. Unwanted email sent in bulk, often for advertising or malicious purposes.
Spam. Unwanted email sent in bulk, often for advertising or malicious purposes.
← Didn't Know|Knew It →
What is phishing?
What is phishing?
Tap to reveal answer
A method to steal sensitive information through deceptive emails. Fraudsters impersonate trusted entities to trick users into revealing data.
A method to steal sensitive information through deceptive emails. Fraudsters impersonate trusted entities to trick users into revealing data.
← Didn't Know|Knew It →
What action protects data by converting it into a secure format?
What action protects data by converting it into a secure format?
Tap to reveal answer
Encryption. Converts readable data into coded format to prevent unauthorized access.
Encryption. Converts readable data into coded format to prevent unauthorized access.
← Didn't Know|Knew It →
Which practice involves updating software to fix vulnerabilities?
Which practice involves updating software to fix vulnerabilities?
Tap to reveal answer
Patching. Updates fix security holes that could be exploited by attackers.
Patching. Updates fix security holes that could be exploited by attackers.
← Didn't Know|Knew It →
What is a brute force attack?
What is a brute force attack?
Tap to reveal answer
A trial-and-error method to decode encrypted data. Systematically tries all possible combinations to crack passwords or keys.
A trial-and-error method to decode encrypted data. Systematically tries all possible combinations to crack passwords or keys.
← Didn't Know|Knew It →
Identify a tool used to protect against data interception.
Identify a tool used to protect against data interception.
Tap to reveal answer
Encryption. Converts data into unreadable format to prevent eavesdropping attacks.
Encryption. Converts data into unreadable format to prevent eavesdropping attacks.
← Didn't Know|Knew It →
What is the purpose of multi-factor authentication?
What is the purpose of multi-factor authentication?
Tap to reveal answer
To enhance security by requiring multiple verification steps. Combines something you know, have, and are for stronger authentication.
To enhance security by requiring multiple verification steps. Combines something you know, have, and are for stronger authentication.
← Didn't Know|Knew It →
Which type of attack involves overwhelming a system with traffic?
Which type of attack involves overwhelming a system with traffic?
Tap to reveal answer
DDoS (Distributed Denial of Service). Multiple compromised computers flood target with traffic to cause outages.
DDoS (Distributed Denial of Service). Multiple compromised computers flood target with traffic to cause outages.
← Didn't Know|Knew It →
What is the function of a CAPTCHA?
What is the function of a CAPTCHA?
Tap to reveal answer
To differentiate between human and automated access. Prevents automated bots from accessing systems meant for humans only.
To differentiate between human and automated access. Prevents automated bots from accessing systems meant for humans only.
← Didn't Know|Knew It →
Identify the component that isolates internal networks from external access.
Identify the component that isolates internal networks from external access.
Tap to reveal answer
Firewall. Controls network traffic flow based on predetermined security rules.
Firewall. Controls network traffic flow based on predetermined security rules.
← Didn't Know|Knew It →
What is social engineering in the context of security?
What is social engineering in the context of security?
Tap to reveal answer
Manipulating individuals to divulge confidential information. Psychological manipulation exploits human trust rather than technical vulnerabilities.
Manipulating individuals to divulge confidential information. Psychological manipulation exploits human trust rather than technical vulnerabilities.
← Didn't Know|Knew It →
What does 'zero-day vulnerability' refer to?
What does 'zero-day vulnerability' refer to?
Tap to reveal answer
A software flaw unknown to the vendor. No patch exists yet, making systems vulnerable until fix is released.
A software flaw unknown to the vendor. No patch exists yet, making systems vulnerable until fix is released.
← Didn't Know|Knew It →
What is the purpose of a security audit?
What is the purpose of a security audit?
Tap to reveal answer
To assess the effectiveness of security measures. Systematic review identifies weaknesses and ensures compliance with policies.
To assess the effectiveness of security measures. Systematic review identifies weaknesses and ensures compliance with policies.
← Didn't Know|Knew It →
Which concept involves restricting access based on user identity?
Which concept involves restricting access based on user identity?
Tap to reveal answer
Access Control. Determines who can access what resources based on authentication and authorization.
Access Control. Determines who can access what resources based on authentication and authorization.
← Didn't Know|Knew It →
What is two-factor authentication (2FA)?
What is two-factor authentication (2FA)?
Tap to reveal answer
A security process requiring two separate authentication methods. Combines password with second factor like SMS or authenticator app.
A security process requiring two separate authentication methods. Combines password with second factor like SMS or authenticator app.
← Didn't Know|Knew It →
What is the primary goal of a security policy?
What is the primary goal of a security policy?
Tap to reveal answer
To establish guidelines for protecting information assets. Formal document outlines security procedures and responsibilities for organizations.
To establish guidelines for protecting information assets. Formal document outlines security procedures and responsibilities for organizations.
← Didn't Know|Knew It →
What is a digital certificate?
What is a digital certificate?
Tap to reveal answer
An electronic document used to prove identity. Cryptographically signed document verifies identity and public key ownership.
An electronic document used to prove identity. Cryptographically signed document verifies identity and public key ownership.
← Didn't Know|Knew It →
Which term describes a network of infected devices under remote control?
Which term describes a network of infected devices under remote control?
Tap to reveal answer
Botnet. Compromised computers controlled remotely to perform coordinated attacks.
Botnet. Compromised computers controlled remotely to perform coordinated attacks.
← Didn't Know|Knew It →