Cyber Security Awareness Crossword Puzzle
Download and print this Cyber Security Awareness crossword puzzle.
Related puzzles:
Browse all Computers / IT Puzzles
QUESTIONS LIST:
- ddos : a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic is known as a _ attack.
- trojan : what is the term for a malicious program that disguises itself as legitimate software?
- validation : what is the term for the process of validating the identity of a user or system?
- web : _ filter is a security measure that prevents users from accessing unauthorized websites.
- authentication : a security measure that requires users to enter a username and password in order to access a computer system is called _ .
- injection : sql _ is a type of attack that attempts to exploit a vulnerability in a web application.
- vulnerabilities : what is the term for a weakness in a system's security that could be exploited by a threat?
- ssl : a protocol for secure data transmission on the internet.
- phishing : a type of attack that tricks a user into revealing their personal information is called
- multi factor : _ authentication is a security measure that requires users to enter two or more pieces of information to authenticate themselves.
- exploit : a type of attack that attempts to gain unauthorized access to a computer system by exploiting a vulnerability in the operating system.
- hacker : a person who tries to gain unauthorized access to computer systems.
- botnet : a network of computers that are infected with malware and controlled by a single attacker.
- encryption : what is the process of converting data into an unreadable format to protect it from unauthorized access?
- switch : a l2 device that is used to connect multiple systems within a network.
- ids : a security measure that is used to detect and prevent unauthorized access to a computer system is called _ .
- virus : a software program that replicates itself and spreads from one computer to another is called
- worm : type of malware that attaches itself to a legitimate file and then executes when the file is opened is called
- mac : what is the term for a unique identifier assigned to a network device?
- snort : popular ids used to check malicious activity in network company.
- ping : what is the method used to measure minimum time needed to send smallest possible amount of data and receive response between two host.