Branch of cyber security, Information security, data, CIA Triad also known as, Threats, Confidentiality, Integrity, Availability, __________ is a path through which an attacker hacks your device, Vulnerability, Integrity, OTP, One time password, Our time password, FIR, First investigation reports, First individual report, ________ is a form of an illegal act where sensitive information such as passwords and credit card details, Worm, Phishing, DDoS, Distributed denial of service, Donot Disturb operating system, __________ is a computer program which runs on any computer system, threats, virus, __________ is a type of computer virus, but it works a bit differently than other viruses, Malware, Worm, ______ attack technique is used by an adversary to steal data from your system., Brute force, Malware.
0%
class 8 computer science
Share
Share
Share
by
Seemasyed87
Class 8
CS
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Win or lose quiz
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
)
Open results
Copy link
QR code
Delete
Continue editing:
?