Someone who uses their hacking skills for legal, and ethical purposes is a ____?
White Hat hacker
What is a keylogger?
A tool that logs, and saves every keystroke on a computing device
How long are your posts on social media sites?
Forever
Define a hacker
Someone who uses a computer to gain access to systems or networks.
How many characters should your password be at a minimum?
8
A trojan is named after which culture's mythology?
Greek
What is the definition of CyberSecurity?
The collection of security tools, policies, safeguard, and practices that protect the cyberspace environment and its occupants.
A grey hat hacker is:
A hacker who violates networks, and computer systems, but do not have malicious intent.
When accessing sensetive information over public networks, one should us a ____?
VPN
What are 3 ways you could identify phishing emails?
1. Email sounds too good to be true, 2. you do not recognize the sender, 3. the email pressures you to act without thinking,4. the message contains unexpected attachments, 5. The message contains text or URLs that look suspicious 6. The logo of the sending organization does not look exactly right
What is the difference between a virus, and a worm?
A virus needs human interaction to reproduce and run whereas a worm does not