Across
- 4. An attacker goes to a local coffee shop and creates a wireless network using the shop’s name, hoping unsuspecting customers will log on. What is this type of attack called?
- 5. In May 2017, this worldwide cyber attack used ransomware to exploit approximately 400,000 unpatched machines, resulting in damages totaling to over 4 billion USD
Down
- 1. You should not just check identity, you should also confirm
- 2. when a container runs in this mode, it is granted most system capabilities available on the host
- 3. After clicking an advertisement on an unsecure website, your computer freezes. A message appears, demanding you pay a certain amount of money to unlock your computer. What is this type of attack called?
