Week 1
Across
- 1. Which type of attack is a trial-and-error method in which hackers systematically attempt passwords, either manually or with a script, until the correct combination is found?
- 2. Which type of attack uses a network of infected devices to flood a particular server with traffic?
- 6. Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this?
- 7. This was designed as a replacement for Telnet. It is a cryptographic network protocol for operating network services securely over an unsecured network
Down
- 1. What is a group of computers networked together and used by hackers to steal information called?
- 3. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- 4. ardware or software designed to prevent unauthorized access to or from a private network.
- 5. Which of the following uses asymmetric key encryption?
- 7. Which describes monitoring software installed without your consent?