This type of malware disguises itself as a legitimate program in order to gain access to a computer system.
What is a Trojan?
This term refers to a password that is easy to guess, often using common words or phrases.
What is a weak password?
This virus, which appeared in 2000, was one of the most widespread and destructive viruses of its time. In it appeared a heart felt message.
What is the I Love You Virus
This security software acts as a barrier between a computer or network and the internet, allowing only authorized traffic to pass through.
What is a firewall?
This type of malware is designed to spread rapidly through a network, often using files to do so.
What is a worm?
This term refers to a password that is made up of random letters, numbers, and symbols, making it much more difficult to guess.
What is a strong password?
This type of cyberattack involves tricking a user into divulging sensitive information, often by posing as a trustworthy entity.
What is phishing?
This security software is designed to detect and remove malware from a computer or network.
What is an antivirus program?
This type of malware encrypts a user's files and demands a ransom payment in order to restore access to them.
What is ransomware?
Bonus Points
What is a lucky person?
This type of malware is designed to take control of a computer or network and use it to send spam emails or launch other attacks
What is a Botnet?
This term refers to a method of authentication that uses a combination of something the user knows (such as a password) and something the user owns (such as a phone).
What is MultiFactor Authentication?
This type of malware is often spread through infected email attachments or links to malicious websites, must be executed.
What is a virus?
How can you make this password stronger:
WoRkPaSsWoRd123
What is adding symbols?
No Points
Enabling this security measure on your Wi-Fi network helps prevent unauthorized access by requiring a password.
What is a Encyrption?
This type of malware is specifically designed to capture login credentials and other sensitive information from a user's computer.
What is a keylogger?
This term refers to the practice of using the same password for multiple accounts, which can be a major security risk.
What is password reuse?
This type of cyberattack involves using a user's own computing resources to mine cryptocurrency without their knowledge or consent.
What is cryptojacking?
This term refers to the practice of creating backups of important data in case it is lost or stolen.
What is data backup?