1) encryption a) the process of decoding the data that was encrypted b) part of a computer system or network that is designed to block unauthorized access while permitting outward communication. c) measures taken to protect a computer or computer system against unauthorized access or attack d) the process of converting information or data into a code, especially to prevent unauthorized access. 2) decryption a) part of a computer system or network that is designed to block unauthorized access while permitting outward communication. b) the psychological manipulation of people into performing actions or divulging confidential information c) the process of decoding the data that was encrypted d) The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with a padlock icon in the address bar. 3) public-key encryption a) the psychological manipulation of people into performing actions or divulging confidential information b) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). c) measures taken to protect a computer or computer system against unauthorized access or attack d) The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with a padlock icon in the address bar. 4) Secure Sockets Layer (SSL) a) The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with a padlock icon in the address bar. b) Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. c) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). d) The Internet is built around the notion of free and open access to information with no blocking, throttling, or paid prioritization. 5) cybersecurity a) measures taken to protect a computer or computer system against unauthorized access or attack b) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). c) software that is intended to damage or disable computers and computer systems. d) The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with a padlock icon in the address bar. 6) firewall a) the psychological manipulation of people into performing actions or divulging confidential information b) the process of converting information or data into a code, especially to prevent unauthorized access. c) part of a computer system or network that is designed to block unauthorized access while permitting outward communication. d) the process of decoding the data that was encrypted 7) DDoS Attack a) Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. b) part of a computer system or network that is designed to block unauthorized access while permitting outward communication. c) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). d) the process of decoding the data that was encrypted 8) social engineering a) the process of decoding the data that was encrypted b) the psychological manipulation of people into performing actions or divulging confidential information c) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). d) the process of converting information or data into a code, especially to prevent unauthorized access. 9) malware a) The Internet is built around the notion of free and open access to information with no blocking, throttling, or paid prioritization. b) software that is intended to damage or disable computers and computer systems. c) the process of decoding the data that was encrypted d) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). 10) Net neutrality a) part of a computer system or network that is designed to block unauthorized access while permitting outward communication. b) The Internet is built around the notion of free and open access to information with no blocking, throttling, or paid prioritization. c) software that is intended to damage or disable computers and computer systems. d) The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with a padlock icon in the address bar.
0%
04.04.24 Do Now U6L8 Cybersecurity
共享
由
Jbarber
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
输赢测验
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?