EIGRP, Cisco protocol for efficient network path selection., Piggybacking, Following authorized personnel into secure areas without scanning., Red Teaming, Simulating full-scale adversarial attacks to test total defenses., Pentesting, Authorized simulated attacks used to find system vulnerabilities., Reconnaissance, The initial phase of gathering information on a target., Adware, Software that displays or downloads unwanted advertising material., Evil Twin, A fake wireless access point mimicking a legitimate one., Non-repudiation, Proof of origin that prevents a sender from denying actions., Trusted Platform Module, Hardware chip that secures devices with cryptographic keys., Secure boot, Verifies startup software is trusted by the manufacturer., Jail Break, Removing software restrictions on a mobile operating system., Enumeration, Probing a target to discover usernames, shares, and services., Devops, Uniting software development and IT operations for speed., Advanced Persistent Threat, A stealthy, long-term attack by sophisticated actors., Black Teaming, Testing physical security through covert entry and deception., Encoding, Converting data into a new format for transmission, LIFI, High-speed wireless data transmission using light waves., RaaS, Renting ransomware tools for a share of the profit., Homomorphic encryption, Computing data while it remains in an encrypted state., Post-Quantum cryptography, Encryption designed to withstand future quantum computer attacks..
0%
Gal
공유
공유
공유
만든이
Galadini10
אקדמיה
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
매치업
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?