Team 1
0
Team 2
0
Teams
Name
Score
1
2
3
4
5
6
7
8
9
10
Loading
×
heart
Other team wins 20 points!
Oops!
×
star
Double points!
Okay!
×
gift
Win 25 points!
Okay!
×
baam
Lose 15 points!
Oops!
5
×
Oops!
Check
Okay!
Check
5
×
Malware is also called as _________________________ software.
Malicious
Oops!
Check
Okay!
Check
5
×
For added security, ___________________should have the combination of letters, symbols, and numbers
Password
Oops!
Check
Okay!
Check
×
seesaw
Swap points!
Oops!
×
gift
Win 25 points!
Okay!
×
rocket
Go to first place!
Okay!
×
lifesaver
Give 20 points!
Oops!
5
×
The two common types of application security are authentication and ____________________.
Authorisation
Oops!
Check
Okay!
Check
5
×
___________________is a software that is designed to block unauthorised access to computers and networks.
Firewall
Oops!
Check
Okay!
Check
5
×
The software that restricts the number and types of users who have access to a network is called as ____________________________.
Network Access Control
Oops!
Check
Okay!
Check
5
×
is network created to secure the connection between the remote computers and other computes.
Virtual Private Network (VPN)
Oops!
Check
Okay!
Check
5
×
An email security software can protect the users from email attacks like __________________
Phishing
Oops!
Check
Okay!
Check
×
Restart
Review
Join for Free
;
Your experience on this site will be improved by allowing cookies.
Allow cookies