This common cyber threat is a type of software designed to harm or exploit devices.
What is malware
A strong password should include these three types of characters.
What are letters, numbers, and symbols
A person who illegally breaks into computers and networks.
What is a hacker
The process of scrambling data so only authorized users can read it.
What is encryption
This security system acts as a barrier between a trusted network and an untrusted network, blocking or allowing traffic based on set rules.
What is firewall
A hacker uses this type of attack to overload a website with traffic, making it crash.
What is a DDoS attack
The āSā in HTTPS stands for this, meaning the website has extra protection.
What is secure
A "white hat" hacker is also called this because they help organizations find security flaws.
What is an ethical hacker
This tool helps create secure connections by hiding your internet activity.
What is a VPN
This type of network connects computers within a small area, like a school or office.
What is a Local Area Network
This type of scam tricks people into giving away personal information through fake emails or websites.
What is phishing
his feature in web browsers helps remember passwords but can be unsafe if hacked.
What is a password manager
The U.S. government agency responsible for investigating cybercrimes.
What is the FBI
This type of encryption uses the same key to both encrypt and decrypt data.
What is symmetric encryption
This website is a great starting point for beginners who want to learn about IT and cybersecurity and gain a certification.
What is CompTia
This type of cyber attack locks your files and demands payment to unlock them.
What is ransomware
This type of two-factor authentication sends a code to your phone to verify your identity.
What is SMS verification
A method where hackers guess passwords by trying many different combinations.
What is a brute force attack
Free points
;)
phishing can be considered what type of engineering
social engineering
This type of malware disguises itself as a legitimate program but performs harmful actions.
What is a Trojan horse
This security setting helps control what personal data apps can access on your phone.
What are app permissions
This type of hacker helps companies strengthen security by acting like a real attacker.
What is a penetration tester
The act of making data unreadable to unauthorized users by transforming it mathematically.
What is cryptography
In cybersecurity, this isolated environment is used to test suspicious programs without harming the main system
What is a sandbox