This port used for web traffic over HHTP?
What is port 80?
Phishing is a type of what broader category o cyber threat?
What is social engineering?
This method transforms data soonly authorized users can read it?
What Is Encryption?
This is the most common type o network used in homes and business.
What is LAN?
This bird is the fastest animal is the world.
What is the peregrine falcon?
Secure web traffic over HHTP uses this port?
what is port 443?
What is the main goal of a phishing attack?
What is it to steal sensitive information?
The principle insurances systems are up and running when needed?
What is availability/
This hardware connects multiple devices in a network and towards data to the correct destination.
What Is a switch?
This sea creature is the largest.
WHat is the blue whale?
This port is used by FTP for file transfers?
what is port 21?
Which common communication method is most often use in phishing?
What is email?
A stolen password used to access private emails violated this.
what is confidentiality?
This type of network spans large geographic areas.
What is WAN?
This land animal is the tallest.
What is the giraffe?
The default port for SSH
What is port 22?
Phishing email often create this emotion to trick victims into acting quickly?
What is urgency and fear?
Integrity insures that data is this.
what is accurate and unaltered?
This Model breaks networking communication into 7 layers.
What is OSI model?
This insect can lifn up 50 times his weight.
What is an ant?
The default port for sending emails using SMPT?
what is port 25?
What does the term "phishing" originates from?
What is the idea of "fishing" for victims using bait?
Viewing confidential data without permission is called this.
What is data breach?
This layer of the OSI model is responsible for end to end communications.
What is the transport layer?
This reptile can live over 150 years.
What is the giant tortoise?