1) It means 'proving to be truth" or "confirmation" a) verification  b) server c) details d) address 2) Hacker ............................the company's data. a) knock off her feet b) takes over c) embedded within  d) wiped off 3) You need to fill in your............................before you get accapted. a) access b) fake c) credentials  d) third party 4) The same meaning as surprised and shocked. a) eligibility b) fraudulent  c) cracked d) knocked off her feet 5) The hacker gained ......................to her phone by cracking the password. a) access  b) malware  c) attachment d) install 6) The hacker is .................................... between the user and the computer. a) implement b) third party c) stored  d) substantial 7) viruses are.............................the phone. I can't get rid of them. a) website b) network c) path d) embedded within 8) Hackers usually steal ..........................amount of money. a) sensitive  b) malicious  c) substantial  d) eligibility 9) weak password is easy to be.......................... a) cracked b) verification  c) receive  d) address 10) to be safe, you should only download .............................files. a) unauthorized b) legitimate c) save  d) phishing 11) when viruses ...........................a computer, it lags. a) suspicious  b) unsecured c) source d) attack 12) It's the opposite of 'allowed to enter' a) unauthorized access b) wiped of c) enable  d) prone to 13) It's a software that is designed to damage a computer system. a) credentials  b) intercepted c) server  d) malware  14) It's a file sent with a message. a) malicious  b) cracked c) attachments d) fraudulent  15) weak phones systems are ............................to hacking. a) prone to b) website  c) network  d) take over 16) It's the same meaning as suspicious. a) data b) fishy c) unsecured  d) intercepted  17) I have to be checked first for .........................before getting accepted for the job a) eligibility  b) save  c) implement  d) third party 18) Same meaning as bad and awful. a) fraudulent b) source  c) install d) malicious  19) .......................links are used to trick someone. a) embedded within b) malware  c) fraudulent d) details

لوحة الصدارة

النمط البصري

الخيارات

تبديل القالب

استعادة الحفظ التلقائي: ؟