1/12 | |||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
14 | 18 | ||||||||||||||||||||||||
4 | 5 | ||||||||||||||||||||||||
6/13 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
15 | 10 | ||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. The practice of modifying the media access control address of a network device to masquerade as a different device or to bypass access controls.
2. Software designed to detect and remove malicious software, such as viruses, from computer systems.
3. Glyphs or characters used to represent emotions or convey feelings in an instant messaging client.
4. Malware that displays unwanted advertisements or redirects browsers to advertising websites.
5. a physical location where people can access the internet, typically using Wi-Fi
6. The speed at which data is transferred from a device to the internet.
7. A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.
8. A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
9. A pair of cryptographic keys, consisting of a public key and a private key.
10. A physical connector on a networking device used to connect network cables or devices.
11. The capability to share files, such as documents, images, or videos, through an instant messaging client.
12. Malicious software designed to harm or exploit computers or networks.
13. The process of converting characters into a format that is suitable for use in a URL.
14. A repository for storing incoming emails until retrieved by a user.
15. The data portion of a packet or frame that carries the actual information being transmitted.
16. A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations.
17. The speed at which data is transferred from the internet to a device.
18. A hardware device that allows wireless devices to connect to a wired network using Wi-Fi.