IT Practicum

1234567891011121314151617181920
Across
  1. 3. self-replicate and spread across networks as rapidly as possible.
  2. 6. network topology where individual switches are connected to a central router
  3. 8. network topology in which every device have a direct connection to every other device in the network
  4. 9. launch applications and switch between open windows on MacOS
  5. 11. A highly targeted and personalized phishing attack aimed at a specific individual, group, or organization.
  6. 12. automatically delivers advertisements, such as pop-up windows, banners on websites, or even by changing a browser's homepage and search engine.
  7. 14. Phishing that is conducted over the phone or via voice messages.
  8. 16. An attack where a legitimate, previously delivered email is copied or "cloned" and then modified with malicious content.
  9. 19. Phishing that takes place on social media platforms.
  10. 20. operates stealthily in the background, collecting sensitive data.
Down
  1. 1. isguises itself as a legitimate or desirable program
  2. 2. To hold deleted files until they are permanently removed The core component that manages the system's resources
  3. 4. The _______ in Windows 11 is where you can find the Start button.
  4. 5. an alternative way to open an application in macOS, other than from the Dock?
  5. 7. Manages files, folders, and applications on the MacOS
  6. 10. A specific type of spear phishing that exclusively targets high-level, senior executives within a company (like the CEO, CFO, or other C-suite members).
  7. 13. encrypts a user's files or locks their entire system, making the data completely inaccessible
  8. 15. Phishing that uses SMS text messages as its delivery method.
  9. 17. combines features of both a star and a bus topology
  10. 18. network topology connects each device to exactly two other devices, forming a single continuous pathway for data transmission