Cyber Security Awareness Crossword Puzzle

Download and print this Cyber Security Awareness crossword puzzle.

Cyber Security Awareness Crossword Puzzle

PDF will include puzzle sheet and the answer key.

 

Browse all Computers / IT Puzzles

QUESTIONS LIST:

  • ddos : a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic is known as a _ attack.
  • trojan : what is the term for a malicious program that disguises itself as legitimate software?
  • validation : what is the term for the process of validating the identity of a user or system?
  • web : _ filter is a security measure that prevents users from accessing unauthorized websites.
  • authentication : a security measure that requires users to enter a username and password in order to access a computer system is called _ .
  • injection : sql _ is a type of attack that attempts to exploit a vulnerability in a web application.
  • vulnerabilities : what is the term for a weakness in a system's security that could be exploited by a threat?
  • ssl : a protocol for secure data transmission on the internet.
  • phishing : a type of attack that tricks a user into revealing their personal information is called
  • multi factor : _ authentication is a security measure that requires users to enter two or more pieces of information to authenticate themselves.
  • exploit : a type of attack that attempts to gain unauthorized access to a computer system by exploiting a vulnerability in the operating system.
  • hacker : a person who tries to gain unauthorized access to computer systems.
  • botnet : a network of computers that are infected with malware and controlled by a single attacker.
  • encryption : what is the process of converting data into an unreadable format to protect it from unauthorized access?
  • switch : a l2 device that is used to connect multiple systems within a network.
  • ids : a security measure that is used to detect and prevent unauthorized access to a computer system is called _ .
  • virus : a software program that replicates itself and spreads from one computer to another is called
  • worm : type of malware that attaches itself to a legitimate file and then executes when the file is opened is called
  • mac : what is the term for a unique identifier assigned to a network device?
  • snort : popular ids used to check malicious activity in network company.
  • ping : what is the method used to measure minimum time needed to send smallest possible amount of data and receive response between two host.