Term for a secret word or phrase used to gain access to a system
A Password
An attack where the hacker demands payment to unlock your files
Ransomware
Always do this before clicking on links in suspicious emails
Verify the source
A secure connection between your device and the internet is called this
VPN
What's the oldest Rivalry in the NFL
Chicago bears and Green Bay Packers
This software helps protect your computer from malicious programs
Antivirus software
Overwhelming a server with traffic to shut it down
DDoS attack
This kind of authentication uses two different forms of verification
Two-factor authentication
This kind of file logs events and actions on systems for review
Log File
What was the first sport in the U.S
Lacrosse
The kind of network is used at coffee shops or airports and often lacks secerity
Public WI-FI
An attack where someone secretly intercepts communication
Man-in-the-middle attack
Avoid doing this with your password especially with friends
Sharing it
These tools detect unathorized access attempts or unusual activity
IDS
Nevada's state flower
Sage Brush
This type of attack involves sending fraudulent emails to steal personal information
Phishing
Exploiting software flaws before vendor knows about them
Zero-day attack
You should do this regularly to all your software and devices
Update them
This type of tool checks for vulnerability in applications or systems
Vulnerability scanner
When was the Chicago bears first SuperBowl win
1985
The acronym stands for a set of rules that protect the confidentiality of data on the internet
HTTPS
An attack where users are tricked into executing malicious code via a fake website
Drive-by download attack
Using the same password across many sites increases this kind of risk
Credential stuffing
This device inspects network traffic and enforces severity policies
Firewall
what ended in the 1927
1926