This type of attack floods a system with traffic to make it unavailable to users.
What is a DDoS (Distributed Denial of Service) attack?
This self-replicating program spreads without user interaction.
What is a worm?
This technique involves pretending to be someone trustworthy to gain information.
What is impersonation?
This software scans for and removes malicious programs.
What is antivirus software?
This is the practice of keeping computers and networks safe from attacks.
What is cybersecurity?
A hacker who exploits vulnerabilities for malicious purposes is known by this color-coded term.
What is a black hat hacker?
Malware that locks files and demands payment is known as this.
What is ransomware?
A scam email asking for login credentials is an example of this.
What is phishing?
A secure network tunnel often used by remote workers is called this.
What is a VPN (Virtual Private Network)?
A secret word or phrase used to access accounts or devices.
What is a password?
This technique involves intercepting communication between two parties to steal data.
What is a man-in-the-middle attack?
This type of malware disguises itself as a harmless program.
What is a Trojan horse?
This method involves manipulating someone over the phone to reveal sensitive data.
What is vishing (voice phishing)?
This tool stores complex passwords securely.
What is a password manager?
This is a common way to protect your online accounts—often used with a password.
What is two-factor authentication (2FA)?
This type of attack tricks a user into executing malicious code by disguising it as legitimate.
What is a phishing attack?
A program that secretly records keystrokes is called this.
What is a keylogger?
Tricking someone into clicking a malicious link on social media is called this.
What is baiting?
This protocol encrypts web traffic to protect user data.
What is HTTPS (Hypertext Transfer Protocol Secure)?
This type of file attachment should be avoided if it comes from an unknown sender.
What is a suspicious or unknown file?
This hacking method involves guessing passwords using dictionaries or random combinations.
What is a brute-force attack?
This malware gives attackers remote control over a victim’s system.
What is a RAT (Remote Access Trojan)?
This term describes exploiting human psychology rather than technical vulnerabilities.
What is social engineering?
This type of firewall monitors and filters incoming and outgoing traffic.
What is a network firewall?
This is the act of updating software to fix security problems.
What is patching or installing updates?