(Blank)
(Blank)
(Blank)

(Blank)
100

Malicious code capable of creating a backdoor

Trojan

100

Linux command to change permission settings

chmod

100

This device can provide electricity

UPS

100

Data recovery software

Recuva

100

Main cybersecurity factor

Human factor

200

Monitored and analyzed network traffic

Sniffing

200

Sw to search for information in file metadata

FOCA

200

Photo metadata exchange standard

EXIF

200

Attack to recover a key by testing all combinations

Brute force attack

200

Ensure that access to information is authorized.

Confidenciality

300

Won his first race after 17 years

Aleix Espargaró

300

Techniques of abuse of trust

Social engineering

300

Small text file created in browser

Cookie

300

Keystroke recovery software

Revealer Keylogger

300

Data about data

Metadata

400

Small image representation

thumbnail

400

Linux module to manage password policy

pwquality

400

High-end equipment UPS

ONLINE or DOUBLE CONVERSION 

400

Young guys without great computer skills

lammers

400

Supplants the identity of a PC or telephone number

Spoofing

500

Ethical Hacker

White hat hacker

500

Network of infected computers

Zombie or Botnet Network

500

Used for discovering the link layer address

ARP

500

File system to active forwarding packets

/etc/sysctl.conf

500

Key combination to access recovery mode in Debian

SHIFT + ESC

M
e
n
u