What is IT Security?, Designing websites, Protecting systems and data, Installing software, Fixing hardware, What does a Firewall do?, Speeds up internet, Stores data, Deletes files, Prevents unauthorized access, Which of the following is security software?, Calculator, Paint, Antivirus, Word processor, What is Malware?, Malicious software, Hardware device, Safe software, Network cable, What does an Email filter do?, Sends emails, Stores contacts, Deletes all emails, Blocks spam and harmful messages, What is Phishing?, Installing apps, Fixing systems, Fake messages to steal information, Cleaning viruses, What is Unauthorized Access?, Access without permission, Access with permission, Guest login, Public access, What is the difference between a Virus and a Worm?, Virus spreads automatically, Worm needs user action, Worm spreads automatically, Virus needs a file, Both are the same, Virus is safe, What does Authentication mean?, Verifying identity, Granting permissions, Blocking users, Tracking activity, What does Authorization mean?, Blocking attacks, Monitoring users, Verifying identity, Giving access rights, What does Accounting (AAA) do?, Gives access, Tracks user activity, Encrypts data, Verifies identity, Which is an example of Data Risk?, Strong password, Data backup, Loss of USB, Firewall, What is Identity Theft?, Encrypting files, Protecting data, Blocking malware, Stealing personal information, Which is a Physical Security method?, Biometrics, Firewall, Antivirus, Email filter, What is the purpose of Backup?, Increase speed, Block users, Restore data after loss, Delete data, What is Eavesdropping?, Intercepting private communication, Deleting files, Sending emails, Installing software, What is Hacking?, Fixing networks, Unauthorized access to systems, Data backup, Authorized access, What is Impersonation?, Monitoring users, Encrypting data, Pretending to be another user, Blocking attacks, What does Malware mean?, Safe software, Network tool, Hardware, Harmful software, What is a Virus?, Protects systems, Encrypts data, Attaches to files and spreads, Spreads automatically without files, What is a Worm?, Deletes files only, Is safe software, Needs user action to spread, Spreads automatically across networks, What is a Trojan?, A firewall, Appears as legitimate software, A virus that deletes files, A backup tool, What is Spyware?, Secretly collects information, Protects systems, Deletes viruses, Blocks access, What is an example of Unauthorized Use?, Using your own account, Updating software, Using another person’s username and password, Changing password, What is Manipulation in security?, Backing up data, Monitoring systems, Protecting data, Altering data illegally.
0%
Unit 05
Paylaş
Paylaş
Paylaş
Salghamdi6
tarafından
İçeriği Düzenle
Yazdır
Yerleştir
Daha fazla
Liderlik Tablosu
En iyi oyuncuları görün
Ödevler
Skor Tablosu
Daha fazla göster
Daha az göster
Bu lider panosu şu anda gizlidir. Herkese açmak için
Paylaş
'a tıklayın.
Bu lider panosu kaynak sahibi tarafından devre dışı bırakıldı.
Seçenekleriniz kaynak sahibinden farklı olduğu için bu lider panosu devre dışı bırakıldı.
Seçenekleri Eski Haline Döndür
Gameshow testi
açık uçlu bir şablondur. Bir lider panosu için skor oluşturmaz.
Giriş gereklidir
Görsel stil
Yazı tipleri
Abonelik gerekli
Seçenekler
Yapay Zeka Geliştirilmiş: Bu etkinlik, yapay zeka tarafından üretilen içerikleri içerir.
Daha fazla bilgi edinin.
Şablonu değiştir
Tümünü göster
Siz etkinliği oynarken daha fazla format görüntülenir.
Liderlik Tablosu
En iyi oyuncuları görün
)
Sonuçları aç
Bağlantıyı kopyala
QR kodu
Sil
Otomatik olarak kaydedilen geri yüklensin mi:
?