What is Information Technology Security?, Protecting systems and data, Printing documents, Designing websites, Buying hardware, What is a Firewall?, Creates backups, Stores passwords, Browses websites, Blocks unauthorized access, What is a Web Browser?, Filters email, Tests networks, Views websites, Encrypts disks, What are Web Services?, Physical device protection, System communication online, Password creation rules, File access rules, What is an Email Filter?, Monitors buildings, Blocks harmful emails, Verifies identity, Recovers lost files, What is Wireless Security?, Repairing cables, Building websites, Protecting Wi-Fi access, Sending attachments, What are Security Updates?, Fix security weaknesses, Increase screen brightness, Delete user accounts, Format hard drives, What is Anti-virus?, Shares personal data, Changes file permissions, Creates wireless signals, Removes malicious programs, What is Unauthorized Use?, Approved file sharing, Access without permission, Safe data backup, Legal software testing, What is Spyware?, Secretly collects information, Protects Wi-Fi networks, Restores deleted files, Monitors password strength, What is Identity Theft?, Testing software updates, Securing folder access, Blocking server traffic, Stealing personal information, What is Malware?, Data backup copy, User activity log, Harmful software, Safe web tool, What is a Virus?, Protects devices physically, Attaches to files, Verifies digital data, Limits folder access, What is a Worm?, Stores backup files, Checks legislation, Encrypts email messages, Spreads across networks, What is a Trojan?, Secure login method, Internet viewing software, Disguised malicious software, System activity report, What is Phishing?, Tricking for information, Repairing damaged hardware, Creating digital signatures, Changing screen settings, What is a Malicious Attachment?, Harmful email file, Wi-Fi login rule, Legal privacy policy, Secure backup copy, What is a Malicious Download?, Verified user login, Threatening software download, Safe software update, Protected folder access, What are File Permissions?, Email blocking settings, Device storage locations, File access rules, Internet browsing tools, What are Folder Permissions?, Virus removal software, Personal data theft, Unauthorized listening, Folder access rules, What is Legislation?, Hidden malware type, Data protection laws, Network attack method, Backup recovery process, What is Authentication?, Recording activities, Flooding a server, Verifying identity, Granting access rights, What is Authorization?, Collecting private data, Checking identity, Blocking unwanted emails, Giving access rights, What is Accounting (AAA)?, Tracking user activities, Restoring lost access, Hiding malicious software, Protecting physical locations, What is Eavesdropping?, Testing network strength, Securing a password, Secretly listening, Encrypting a disk, What is Hacking?, Unauthorized system access, Viewing websites, Creating backups, Updating software, What is Impersonation?, Copying backup files, Testing digital signatures, Blocking email spam, Pretending to be another, What is Manipulation?, Server traffic control, Unauthorized data change, Safe file storage, Verified network access, What is Penetration?, Attempting system break-in, Recovering lost data, Accessing websites online, Protecting personal privacy, What is Access Control?, Sharing user passwords, Collecting system logs, Downloading web pages, Restricting system access, What is a Password Policy?, Website display settings, Rules for backups, Password creation rules, Email attachment checking, What are Biometrics?, Malicious hidden programs, Physical identity features, Wireless signal boosters, Server flooding attacks, What is Physical Security?, Scanning email attachments, Securing online communication, Managing web services, Protecting devices and locations, What is Disk Encryption?, Flooding network traffic, Coding stored data, Tracking login attempts, Deleting harmful software, What is Safe Storage?, Creating fake identities, Monitoring websites, Keeping data secure, Changing folder rules, What is a Backup?, Copy of data, Unauthorized system entry, A hidden threat, A privacy law, What is Restore?, Blocking unwanted traffic, Collecting user details, Granting permissions, Recovering from backup, What is a Digital Signature?, Tests building safety, Verifies digital authenticity, Removes rootkits, Blocks Wi-Fi access, What is a Security Audit?, Browsing the internet, Making password guesses, Reviewing security weaknesses, Sending email messages, What is Privacy?, Protecting personal information, Spreading across networks, Changing user accounts, Installing safe downloads, What is Ransomware?, Demands payment, Checks file access, Filters spam emails, Stores web pages, What is DDoS?, Stealing passwords quietly, Flooding server traffic, Securing wireless access, Recovering deleted data, What is an Attack?, Legal data policy, Verified software update, Attempt to cause harm, Safe user login, What is a Rootkit?, Physical lock system, Website viewing software, Folder backup method, Hidden access malware.
0%
IT Security Terms
共享
共享
共享
由
Salghamdi6
编辑内容
打印
嵌入
更多
排行榜
查看顶级球员
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
问答游戏
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
AI增强版:本活动包含AI生成的内容。
了解更多信息。
切换模板
显示所有
播放活动时将显示更多格式。
排行榜
查看顶级球员
)
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?