What is Information Technology Security?, Protecting systems and data, Printing documents, Designing websites, Buying hardware, What is a Firewall?, Creates backups, Stores passwords, Browses websites, Blocks unauthorized access, What is a Web Browser?, Filters email, Tests networks, Views websites, Encrypts disks, What are Web Services?, Physical device protection, System communication online, Password creation rules, File access rules, What is an Email Filter?, Monitors buildings, Blocks harmful emails, Verifies identity, Recovers lost files, What is Wireless Security?, Repairing cables, Building websites, Protecting Wi-Fi access, Sending attachments, What are Security Updates?, Fix security weaknesses, Increase screen brightness, Delete user accounts, Format hard drives, What is Anti-virus?, Shares personal data, Changes file permissions, Creates wireless signals, Removes malicious programs, What is Unauthorized Use?, Approved file sharing, Access without permission, Safe data backup, Legal software testing, What is Spyware?, Secretly collects information, Protects Wi-Fi networks, Restores deleted files, Monitors password strength, What is Identity Theft?, Testing software updates, Securing folder access, Blocking server traffic, Stealing personal information, What is Malware?, Data backup copy, User activity log, Harmful software, Safe web tool, What is a Virus?, Protects devices physically, Attaches to files, Verifies digital data, Limits folder access, What is a Worm?, Stores backup files, Checks legislation, Encrypts email messages, Spreads across networks, What is a Trojan?, Secure login method, Internet viewing software, Disguised malicious software, System activity report, What is Phishing?, Tricking for information, Repairing damaged hardware, Creating digital signatures, Changing screen settings, What is a Malicious Attachment?, Harmful email file, Wi-Fi login rule, Legal privacy policy, Secure backup copy, What is a Malicious Download?, Verified user login, Threatening software download, Safe software update, Protected folder access, What are File Permissions?, Email blocking settings, Device storage locations, File access rules, Internet browsing tools, What are Folder Permissions?, Virus removal software, Personal data theft, Unauthorized listening, Folder access rules, What is Legislation?, Hidden malware type, Data protection laws, Network attack method, Backup recovery process, What is Authentication?, Recording activities, Flooding a server, Verifying identity, Granting access rights, What is Authorization?, Collecting private data, Checking identity, Blocking unwanted emails, Giving access rights, What is Accounting (AAA)?, Tracking user activities, Restoring lost access, Hiding malicious software, Protecting physical locations, What is Eavesdropping?, Testing network strength, Securing a password, Secretly listening, Encrypting a disk, What is Hacking?, Unauthorized system access, Viewing websites, Creating backups, Updating software, What is Impersonation?, Copying backup files, Testing digital signatures, Blocking email spam, Pretending to be another, What is Manipulation?, Server traffic control, Unauthorized data change, Safe file storage, Verified network access, What is Penetration?, Attempting system break-in, Recovering lost data, Accessing websites online, Protecting personal privacy, What is Access Control?, Sharing user passwords, Collecting system logs, Downloading web pages, Restricting system access, What is a Password Policy?, Website display settings, Rules for backups, Password creation rules, Email attachment checking, What are Biometrics?, Malicious hidden programs, Physical identity features, Wireless signal boosters, Server flooding attacks, What is Physical Security?, Scanning email attachments, Securing online communication, Managing web services, Protecting devices and locations, What is Disk Encryption?, Flooding network traffic, Coding stored data, Tracking login attempts, Deleting harmful software, What is Safe Storage?, Creating fake identities, Monitoring websites, Keeping data secure, Changing folder rules, What is a Backup?, Copy of data, Unauthorized system entry, A hidden threat, A privacy law, What is Restore?, Blocking unwanted traffic, Collecting user details, Granting permissions, Recovering from backup, What is a Digital Signature?, Tests building safety, Verifies digital authenticity, Removes rootkits, Blocks Wi-Fi access, What is a Security Audit?, Browsing the internet, Making password guesses, Reviewing security weaknesses, Sending email messages, What is Privacy?, Protecting personal information, Spreading across networks, Changing user accounts, Installing safe downloads, What is Ransomware?, Demands payment, Checks file access, Filters spam emails, Stores web pages, What is DDoS?, Stealing passwords quietly, Flooding server traffic, Securing wireless access, Recovering deleted data, What is an Attack?, Legal data policy, Verified software update, Attempt to cause harm, Safe user login, What is a Rootkit?, Physical lock system, Website viewing software, Folder backup method, Hidden access malware.
0%
IT Security Terms
Condividi
Condividi
Condividi
di
Salghamdi6
Modifica contenuto
Stampa
Incorpora
Altro
Classifica
Vedi i migliori giocatori
Compiti
Classifica
Mostra di più
Mostra meno
Questa classifica è privata. Fai clic su
Condividi
per renderla pubblica.
Questa classifica è stata disattivata dal proprietario della risorsa.
Questa classifica è disattivata perché le impostazioni sono diverse da quelle del proprietario della risorsa.
Ripristina le opzioni
Telequiz
è un modello a risposta aperta. Non genera punteggi validi per una classifica.
Login necessario
Stile di visualizzazione
Tipi di caratteri
Abbonamento richiesto
Opzioni
AI Enhanced: Questa attività contiene contenuti generati dall'IA.
Ulteriori informazioni.
Cambia modello
Mostra tutto
Mentre esegui l'attività appariranno altri formati.
Classifica
Vedi i migliori giocatori
)
Apri risultati
Copia link
Codice QR
Elimina
Ripristinare il titolo salvato automaticamente:
?