This type of cyber threat involves unauthorized access to a computer or network.
What is hacking?
What is the term for the process of verifying a user's identity?
What is authentication?
This type of malware encrypts a victim’s files and demands payment for the decryption key.
What is ransomware?
What is the first line of defense against unauthorized access to a network?
What is a firewall?
This open-source network scanning tool is commonly used to discover hosts, services, and vulnerabilities on a network.
What is Nmap?
The following are examples of what: Trojan, virus, bugs
What are Malware?
Enabling this feature on your smartphone helps protect it from unauthorized access. HINT It is unique to every individual
What is biometric authentication?
This type of malware attaches itself to legitimate programs and spreads when the programs are run.
What is a virus?
A secret word or phrase used to get into a PC or network.
What is a password?
This system collects and analyzes log data from multiple sources to help detect, investigate, and respond to security incidents.
What is a SIEM?
overwhelms a computer network causing it to slow down
What is a DOS
VPN stands for what, which creates a secure connection over the internet?
What is Virtual Private Network?
This type of malware program looks harmless but gives hackers backdoor access to your system once installed.
What is a Trojan horse (or simply Trojan)?
This kind of code scrambles your information so hackers can’t read it, only can decrypt it
What is encryption?
This infamous exploit, leaked by the Shadow Brokers in 2017, targets a Windows vulnerability in SMBv1 and was used in the WannaCry ransomware attack.
What is EternalBlue?
This type of cyber attack involves exploiting vulnerabilities in a system to gain unauthorized access or steal data.
What is exploitation?
What does a UTM appliance typically combine to provide comprehensive security for a network?
What is firewall, antivirus, intrusion detection, and content filtering?
This form of deception tricks users into giving up sensitive information by posing as a trustworthy entity in electronic communication.
What is a Phishing?
Software that helps find and remove harmful programs and malwares on your computer.
What is antivirus software?
In CCDC, maintaining system availability, patching vulnerabilities, and keeping services running for the client simulates meeting this real-world agreement often used in IT to guarantee uptime and performance.
What is an SLA (Service Level Agreement)?
This kind of malicious software secretly monitors/ spy on a user's activities and sends information back to a third party.
What is a spyware?
What is the term for the practice of hiding sensitive information within less sensitive information?
What is steganography?
This term describes unsolicited, malicious, unnecessary emails sent in bulk to flood a persons email.
What is spam?
This is the term for a backup online where you can store copies of important files in case something bad happens.
What is the cloud?
This SSH configuration directive lets you specify exactly which users are allowed to log in; setting it to ‘root’ restricts access to only the root account.
What is Allow Users Root?