Week 1

1234567
Across
  1. 1. Which type of attack is a trial-and-error method in which hackers systematically attempt passwords, either manually or with a script, until the correct combination is found?
  2. 2. Which type of attack uses a network of infected devices to flood a particular server with traffic?
  3. 6. Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this?
  4. 7. This was designed as a replacement for Telnet. It is a cryptographic network protocol for operating network services securely over an unsecured network
Down
  1. 1. What is a group of computers networked together and used by hackers to steal information called?
  2. 3. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  3. 4. ardware or software designed to prevent unauthorized access to or from a private network.
  4. 5. Which of the following uses asymmetric key encryption?
  5. 7. Which describes monitoring software installed without your consent?