Questions
- What does “VPN” stand for?
- Name the malware that encrypts files and demands payment.
- Which type of attack involves sending fraudulent emails?
- What does “Phishing” aim to do?
- Name the cybersecurity principle that ensures only authorized users access data.
- Which organization is responsible for coordinating internet security standards?
- What type of software is used to detect and remove viruses?
- Name the common security protocol used for Wi-Fi networks.
- What does “Firewall” do in network security?
- Which type of attack involves overwhelming a network with traffic?
Answers
- Virtual Private Network
- Ransomware
- Phishing
- Trick users into revealing sensitive information
- Authentication and Access Control
- IETF (Internet Engineering Task Force) or ISO
- Antivirus software
- WPA/WPA2
- Blocks unauthorized access to or from a network
- Denial of Service (DoS) attack