What is IT Security?, Designing websites, Protecting systems and data, Installing software, Fixing hardware, What does a Firewall do?, Speeds up internet, Stores data, Deletes files, Prevents unauthorized access, Which of the following is security software?, Calculator, Paint, Antivirus, Word processor, What is Malware?, Malicious software, Hardware device, Safe software, Network cable, What does an Email filter do?, Sends emails, Stores contacts, Deletes all emails, Blocks spam and harmful messages, What is Phishing?, Installing apps, Fixing systems, Fake messages to steal information, Cleaning viruses, What is Unauthorized Access?, Access without permission, Access with permission, Guest login, Public access, What is the difference between a Virus and a Worm?, Virus spreads automatically, Worm needs user action, Worm spreads automatically, Virus needs a file, Both are the same, Virus is safe, What does Authentication mean?, Verifying identity, Granting permissions, Blocking users, Tracking activity, What does Authorization mean?, Blocking attacks, Monitoring users, Verifying identity, Giving access rights, What does Accounting (AAA) do?, Gives access, Tracks user activity, Encrypts data, Verifies identity, Which is an example of Data Risk?, Strong password, Data backup, Loss of USB, Firewall, What is Identity Theft?, Encrypting files, Protecting data, Blocking malware, Stealing personal information, Which is a Physical Security method?, Biometrics, Firewall, Antivirus, Email filter, What is the purpose of Backup?, Increase speed, Block users, Restore data after loss, Delete data, What is Eavesdropping?, Intercepting private communication, Deleting files, Sending emails, Installing software, What is Hacking?, Fixing networks, Unauthorized access to systems, Data backup, Authorized access, What is Impersonation?, Monitoring users, Encrypting data, Pretending to be another user, Blocking attacks, What does Malware mean?, Safe software, Network tool, Hardware, Harmful software, What is a Virus?, Protects systems, Encrypts data, Attaches to files and spreads, Spreads automatically without files, What is a Worm?, Deletes files only, Is safe software, Needs user action to spread, Spreads automatically across networks, What is a Trojan?, A firewall, Appears as legitimate software, A virus that deletes files, A backup tool, What is Spyware?, Secretly collects information, Protects systems, Deletes viruses, Blocks access, What is an example of Unauthorized Use?, Using your own account, Updating software, Using another person’s username and password, Changing password, What is Manipulation in security?, Backing up data, Monitoring systems, Protecting data, Altering data illegally.

Clasament

Vezi cei mai buni jucători

Clasament

Stilul vizual

Opţiuni

AI Îmbunătățit: Această activitate conține conținut generat de AI. Află mai multe.

Comutare șablon

Clasament

Vezi cei mai buni jucători
)
Restaurare activitate salvată automat: ?