Game Preview

ict

  •  Uzbek    13     Public
    iufr
  •   Study   Slideshow
  • strong password should contain:
    at least one capital letter,  at least one numerical value,  at least one other keyboard character
  •  15
  • components of an access level :
    administrator, standart, guest
  •  15
  • Difference between Phishing and Pharming?
    two similar but different types of cybercrime.Phishing involves sending deceptive communication. Pharming is a more advanced method that manipulates DNS records
  •  15
  • What is the best example of security?
    Access levels, Authentication, Biometrics, 2 step verification, Firewall, Secure sockets layer (SSL)
  •  15
  • Two most common types of antimalware:..
    Anti-virus, Anti-spyware:
  •  15
  • Viruses are...
    Viruses are programs or program code that replicate (copies themselves) with the intention of deleting or corrupting files
  •  15
  • what is Adware?
    Adware is a type of malware. At its least dangerous it will attempt to flood an end-user with unwanted advertising.
  •  15
  • Spyware is...
    Spyware is software that gathers information by monitoring a user’s activities carried out on their computer.
  •  15
  • Trojans horse ...
    A Trojan horse replaces all or part of the legitimate software with the intent of carrying out some harm to the user’s computer system.
  •  15
  • what is Worms?
    Worms are a type of stand-alone malware that can self-replicate.
  •  15
  • what is DDoS stands for?
    Distributed Denial of Service
  •  15
  • what is Data interception?
    Data interception is a form of stealing data by tapping into a wired or wireless communication link.
  •  15
  • what is Brute force attack?
    If a hacker wants to ‘crack’ your password, they can systematically try all the different combinations of letters, numbers and other symbols until eventually
  •  15