two types of network layer firewalls
what is stateful and stateless?
Who invented Cyber Security?
What is Bob Thomas?
Defined as programs that track where you go on the Internet and what you type into your keyboard.
What is a spyware?
How long does it take to detect a cyber breach?
What is 197 days?
Which mobile phone gets hacked the most?
What is Android?
_______ attacks requires a carrier file to self-replicate
What is Virus?
When did Cyber Security begin?
What is 1988?
It is included in a trusted system and frequently offers something you might be interested in, such as a screen saver or photograph, but is designed to give hackers access to your computer or files.
What is Trojan Horse?
What information is stolen in a data breach?
bank account information, online passwords, driver's license numbers, social security numbers, medical records, online subscriptions, and so on
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
What is the most hacked website
What is Facebook?
The first Cyber Security Software?
What is Reaper?
This can appear as unpredictable computer behavior, a lack of reaction to keyboard or mouse operations, crashing or resuming on its own, or running slower than usual.
What is a malware infection?
This image in the lower-right corner of your web browser indicates you are on a secure website...
What is lock icon?
What do cyber attackers do?
Send emails to a huge number of people requesting sensitive information or persuading them to visit a fake website.
_____ uses asymmetric key encryption
PGP (Pretty Good Privacy)
What is the main cause of Cyber Security?
What is the lack of security assistance?
4 types of dangerous malware include...
What is ransomware, spyware, trojans, and worms?
Something you should practice on a regular basis to guarantee that if something goes wrong, you can restore your computer to a previous state.
What is backup your computer or data?
These are organized groups supported by foreign countries and dedicated to mapping out internet addresses for spying and possible computer attacks.
What is state sponsored hacking?
_____ offers the strongest wireless signal encryption
WPA (Wi-Fi Protected Access)
How many Cyber attacks are there per day in the USA?
2,200 every day, which equals to approximately one cyberattack every 39 seconds.
What is malware known for?
What is tricking a victim into providing personal data for identity theft
The average life cycle of a data breach is about...
What is 11 months?
They are well-organized groups of hackers who search for computer weaknesses in order to steal large numbers of financial or credit card accounts for financial benefit.
Who are organized crime groups?