1 | 15/16 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | 18 | ||||||||||||||||||||||||
5/14 | |||||||||||||||||||||||||
19 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
17 | 9 | ||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
1. A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic.
2. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
3. Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
4. A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them.
5. A social engineering technique that involves offering something enticing to trick individuals into revealing information or taking action.
6. Devices that have been compromised by malware and are part of a botnet.
7. A secure network connection that allows remote users to access a private network over the internet securely.
8. Information used to authenticate a user's identity, typically consisting of a username and password.
9. A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area.
10. The act of manipulating people into performing actions or divulging confidential information.
11. The process of verifying the identity of a user by requiring them to provide a password.
12. A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.
13. In asymmetric encryption, a key that is publicly available and used for encryption.
14. Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.
15. The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft.
16. The process of converting plaintext into ciphertext using an encryption algorithm and a key.
17. A type of malware disguised as legitimate software, which allows unauthorized access to a computer or network.
18. A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective.
19. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.