MFA
Multi-Factor Authentication
Phishing uses emotions like fear, urgency, and greed. T/F
True
What is the difference between http and https for a website URL?
The "s" in https means it is a secure connection.
This startup was acquired by FaceBook for $1 billion in 2012 and is known for the posting of pictures.
I have many keys and can't open any doors.
Keyboard
LAN
Local Area Network
Phishing attacks are designed to appear to come from legitimate sources. T/F
True
This hardware is designed to secure an entire network.
Firewall
Open source operating system first released in 1991 by Linus Torvalds.
Linux
You bob for them at halloween.
Apple
WAN
Wide Area Network
It takes more than one phishing attack to compromise a network. T/F
False
Social Engineering
The name of the region near San Francisco that serves as a global center for technology, innovation, and social media.
Silicon Valley
This 'rodent' first appeared on desktops in January 1983.
Mouse
Mobile Device Management
The term for a fraudulent phone call designed to obtain sensitive information, such as login credentials.
Vishing
Nickname for an ethical hacker that uses their skills to identify vulnerabilities in hardware, software, or networks.
This high-tech mogul appeared on a 1995 cover of Time headlined, "Master of the Universe".
Bill Gates
This might be open when it's hot and be closed if it has rained. If you look on some old churches these have been stained.
Windows
WAP or AP
Wireless Access Point or Access Point
This term is when attackers go after a "big fish" at the company, often an executive or someone with bank access.
Whaling
It sounds like something a hound would do, but this term describes watching for and catching data packets passing through a networks traffic.
Sniffing
This was the first widely used web browser.
Mosaic
My screen is bigger than a phone's and smaller than a computer's.
Tablet