This attack uses a fake email that tries to steal your info.
What is a phishing attack?
This device connects networks together (not a switch).
What is a router?
A method or algorithm used to encrypt and decrypt information.
What is a cipher?
This type of malware is known for self-replicating across systems.
What is a worm?
What does "URL" stand for?
What is "Uniform Resource Locator"?
This attack occurs when an attacker guesses many passwords until one works.
What is a brute force attack?
This protocol is used to securely browse websites.
What is HTTPS?
This encryption method uses the same key is used to encrypt and decrypt.
What is symmetric encryption?
This type of malware is hidden inside hardware or firmware.
What is a rootkit?
This term refers to how long a system or service has been running without interruption.
What is uptime?
This attack uses malicious code hidden inside a normal-looking file.
What is a Trojan?
What does DNS do?
What is "translates domain names into IP adresses" (or similar)?
This widely used hashing algorithm outputs 256-bit hashes.
What is SHA-256?
This type of malware secretly mines cryptocurrency on a victim's machine.
What is a cryptojacker?
This symbol in a browser's address bar indicates a secure connection.
What is a padlock icon? (or similar)
This type of attack can occur when a hacker secretly sits between two people communicating.
What is a man-in-the-middle (MiTM) attack?
This is the maximum amount of data that can be transferred per second.
What is bandwidth?
In cryptography, this is the original, readable data before it is encrypted.
What is plaintext?
This type of malware encrypts your files and demands payment.
What is ransomware?
This data defines and describes the characteristics of other data.
What is metadata?
This attack occurs when attackers inject malicious code into a website through user input.
What is Cross-site Scripting (XSS)?
This creates separate virtual networks on the same physical switch.
What is a Virtual Local Area Network (VLAN)?
RSA security relies on the difficulty of solving this mathematical problem.
What is factoring large prime numbers?
This type of malware activates when specific conditions are met (like a date or event).
What is a logic bomb?
This is responsible for verifying and issuing trusted digital certificates for websites.
What is a certification authority (CA)?