Across
- 3. self-replicate and spread across networks as rapidly as possible.
- 6. network topology where individual switches are connected to a central router
- 8. network topology in which every device have a direct connection to every other device in the network
- 9. launch applications and switch between open windows on MacOS
- 11. A highly targeted and personalized phishing attack aimed at a specific individual, group, or organization.
- 12. automatically delivers advertisements, such as pop-up windows, banners on websites, or even by changing a browser's homepage and search engine.
- 14. Phishing that is conducted over the phone or via voice messages.
- 16. An attack where a legitimate, previously delivered email is copied or "cloned" and then modified with malicious content.
- 19. Phishing that takes place on social media platforms.
- 20. operates stealthily in the background, collecting sensitive data.
Down
- 1. isguises itself as a legitimate or desirable program
- 2. To hold deleted files until they are permanently removed The core component that manages the system's resources
- 4. The _______ in Windows 11 is where you can find the Start button.
- 5. an alternative way to open an application in macOS, other than from the Dock?
- 7. Manages files, folders, and applications on the MacOS
- 10. A specific type of spear phishing that exclusively targets high-level, senior executives within a company (like the CEO, CFO, or other C-suite members).
- 13. encrypts a user's files or locks their entire system, making the data completely inaccessible
- 15. Phishing that uses SMS text messages as its delivery method.
- 17. combines features of both a star and a bus topology
- 18. network topology connects each device to exactly two other devices, forming a single continuous pathway for data transmission
