Type of malicious software spread by a user's actions
Virus
The trail you leave behind on the internet.
Digital Footprint
The arrangement of devices on a network.
Topology
A programmable electronic device that can store, retrieve, and process data.
Computer
The National Day morning announcements told us is on March 4th.
National Pound Cake Day
The practice of sending fake emails that appear to be legitimate.
Phishing
What does CAPTCHAs stand for?
Completely Automated Public Turing test to tell Computers and Humans Apart
Topology arrangement that is one line of devices connected where data can only go in one direction and never loop back.
Bus topology
What does the www in front of a URL stand for?
World Wide Web
A Tony award is for which type of entertainment?
Theater
Software disguised as something else.
Trojan Horse
The confirmation of someone's identity through information only known to them.
An emulation of computer system.
Virtual Machine (VM)
Set of step by step instructions.
Algorithm
Name all of Kim Kardashian's children.
North, Saint, Chicago and Psalm.
Malicious software that bypasses the normal, secure, or restricted access.
Backdoor
Using a ___ browser allows a user to surf the internet without saving browsing history.
Private
The security measure in a network that blocks/stops malware from entering a device.
Firewall/antivirus
Most popular operating system.
Microsoft Windows
Charles Entertainment Cheese
Malware that goes for the top level user.
Rootkit
Using psychology to get information from someone for malicious intent.
Social engineering
A socket address is the combination of the ___ address and a ___ number.
IP address, port number
The type of keyboard we use in the US.
Qwerty
The only king in a deck of cards without a moustache.
King of Hearts