What is Information Technology Security?, Protecting systems and data, Printing documents, Designing websites, Buying hardware, What is a Firewall?, Creates backups, Stores passwords, Browses websites, Blocks unauthorized access, What is a Web Browser?, Filters email, Tests networks, Views websites, Encrypts disks, What are Web Services?, Physical device protection, System communication online, Password creation rules, File access rules, What is an Email Filter?, Monitors buildings, Blocks harmful emails, Verifies identity, Recovers lost files, What is Wireless Security?, Repairing cables, Building websites, Protecting Wi-Fi access, Sending attachments, What are Security Updates?, Fix security weaknesses, Increase screen brightness, Delete user accounts, Format hard drives, What is Anti-virus?, Shares personal data, Changes file permissions, Creates wireless signals, Removes malicious programs, What is Unauthorized Use?, Approved file sharing, Access without permission, Safe data backup, Legal software testing, What is Spyware?, Secretly collects information, Protects Wi-Fi networks, Restores deleted files, Monitors password strength, What is Identity Theft?, Testing software updates, Securing folder access, Blocking server traffic, Stealing personal information, What is Malware?, Data backup copy, User activity log, Harmful software, Safe web tool, What is a Virus?, Protects devices physically, Attaches to files, Verifies digital data, Limits folder access, What is a Worm?, Stores backup files, Checks legislation, Encrypts email messages, Spreads across networks, What is a Trojan?, Secure login method, Internet viewing software, Disguised malicious software, System activity report, What is Phishing?, Tricking for information, Repairing damaged hardware, Creating digital signatures, Changing screen settings, What is a Malicious Attachment?, Harmful email file, Wi-Fi login rule, Legal privacy policy, Secure backup copy, What is a Malicious Download?, Verified user login, Threatening software download, Safe software update, Protected folder access, What are File Permissions?, Email blocking settings, Device storage locations, File access rules, Internet browsing tools, What are Folder Permissions?, Virus removal software, Personal data theft, Unauthorized listening, Folder access rules, What is Legislation?, Hidden malware type, Data protection laws, Network attack method, Backup recovery process, What is Authentication?, Recording activities, Flooding a server, Verifying identity, Granting access rights, What is Authorization?, Collecting private data, Checking identity, Blocking unwanted emails, Giving access rights, What is Accounting (AAA)?, Tracking user activities, Restoring lost access, Hiding malicious software, Protecting physical locations, What is Eavesdropping?, Testing network strength, Securing a password, Secretly listening, Encrypting a disk, What is Hacking?, Unauthorized system access, Viewing websites, Creating backups, Updating software, What is Impersonation?, Copying backup files, Testing digital signatures, Blocking email spam, Pretending to be another, What is Manipulation?, Server traffic control, Unauthorized data change, Safe file storage, Verified network access, What is Penetration?, Attempting system break-in, Recovering lost data, Accessing websites online, Protecting personal privacy, What is Access Control?, Sharing user passwords, Collecting system logs, Downloading web pages, Restricting system access, What is a Password Policy?, Website display settings, Rules for backups, Password creation rules, Email attachment checking, What are Biometrics?, Malicious hidden programs, Physical identity features, Wireless signal boosters, Server flooding attacks, What is Physical Security?, Scanning email attachments, Securing online communication, Managing web services, Protecting devices and locations, What is Disk Encryption?, Flooding network traffic, Coding stored data, Tracking login attempts, Deleting harmful software, What is Safe Storage?, Creating fake identities, Monitoring websites, Keeping data secure, Changing folder rules, What is a Backup?, Copy of data, Unauthorized system entry, A hidden threat, A privacy law, What is Restore?, Blocking unwanted traffic, Collecting user details, Granting permissions, Recovering from backup, What is a Digital Signature?, Tests building safety, Verifies digital authenticity, Removes rootkits, Blocks Wi-Fi access, What is a Security Audit?, Browsing the internet, Making password guesses, Reviewing security weaknesses, Sending email messages, What is Privacy?, Protecting personal information, Spreading across networks, Changing user accounts, Installing safe downloads, What is Ransomware?, Demands payment, Checks file access, Filters spam emails, Stores web pages, What is DDoS?, Stealing passwords quietly, Flooding server traffic, Securing wireless access, Recovering deleted data, What is an Attack?, Legal data policy, Verified software update, Attempt to cause harm, Safe user login, What is a Rootkit?, Physical lock system, Website viewing software, Folder backup method, Hidden access malware.
0%
IT Security Terms
공유
공유
공유
만든이
Salghamdi6
콘텐츠 편집
인쇄
퍼가기
더보기
리더보드
주요 선수 보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
게임쇼 퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
AI 강화: 이 활동에는 AI가 생성한 콘텐츠가 포함되어 있습니다.
더 알아보세요.
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
리더보드
주요 선수 보기
)
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?