Physical Security
Malware
Linux Commands
Type Of Attacks
Is this a type of link on Cyber Access?
100

Example of physical security that channels people through to one point

What is a gate/fence?

100

When something looks legit but ends up being an untrustworthy site.

What is a Trojan?

100
When you navigate to Desktop.

What is /Desktop

100

When someone impersonates your email and sends a scam email out.

What is Phishing

100

Windows 7

What is yes?

200

A security measure you can take to make sure nobody sneaks up to your house.

What is a ring doorbell?

200
When malicious software replicate itself to make it more dangerous?

What is a Virus?

200
When you delete a file forever.

What is rm?

200

A program designed to damage computer systems.

What is Malware?

200

Kali Linux

What is Yes?


300

A necessity to have inside of your house to ensure there is no smoke.

What is a smoke alarm?

300

When malware spreads across networks without human interaction

What are worms?

300
When moving a document into a another folder
What is cd?
300

What type of software infects computers and tracks your every move online?

What is Spyware?
300

Cyber Ranger

What is no?
400

A measure that can be taken to ensure you have nobody entering your house by picking your lock.

What is a high-security lock?

400

When a pop-up forms, it is called?

What is Adware?

400

How to show all folders in the directory.

What is ln?

400

When someone inserts code to steal data.

What is SQL injection?

400

Windows Server 22

What is yes?

500

A good spot to put belongings just incase someone were to enter your house without permission.

What is a safe?

500

Records every keystroke by a user

What is Keylogging?

500

When you create a new directory.

What is mkdir?

500

When someone steals your data

What is Ransomware?

500

Malware 

What is no?
M
e
n
u