Cyber Security Answer Key
Cyber Security Answer Key
1 2
T F I R E W A L L
3
R C
4 5
W O R M B O T S
J O
6
S P Y W A R E K
7
N A I
8 9
M H D E I
10 11 12
B A C K D O O R W I N T R A N E T
13
L R A A T N
14
I S R N E B C
15
C B L E N D E D T H R E A T R
I I N C Y
16
O A T T A C K V E K P
U I T U T
17
S H A C K E R P I
18
C U V O
19
O P H I S H I N G N
D R
20
E C Y B E R S E C U R I T Y
S
Across 15. refers to the process of making copies of 7. any software program in which advertising
2. a network security system, either data or data files to use in the event the original banners are displayed while the program is
hardware- or software-based, that controls data or data files are lost or destroyed. running.
incoming and outgoing network traffic based on 16. an attempt by hackers to damage or 8. used to describe any code in any part of a
a set of rules. destroy a computer network or system. software system or script that is intended to
4. a standalone malware computer program 17. someone who seeks and exploits cause undesired effects, security breaches or
that replicates itself in order to spread to other weaknesses in a computer system or computer damage to a system.
computers. network. 9. global system of interconnected computer
5. are similar to worms and Trojans, but earn 19. the activity of defrauding an online networks that use the Internet protocol suite
their unique name by performing a wide variety account holder of financial information by 12. made possible by using algorithms to
of automated tasks on behalf of their master posing as a legitimate company. create complex codes out of simple data,
(the cybercriminals) who are often safely 20. body of technologies, processes and effectively making it more difficult for
located somewhere far across the Internet. practices designed to protect networks, cyberthieves to gain access to the information
6. software that enables a user to obtain computers, programs and data from attack, 13. designed to detect and destroy computer
covert information about another's computer damage or unauthorized access viruses.
activities by transmitting data covertly from Down 14. refers to the process of making copies of
their hard drive. data or data files to use in the event the original
1. any malicious computer program which is
10. a method, often secret, of bypassing used to hack into a computer by misleading data or data files are lost or destroyed.
normal authentication in a product users of its true intent 18. a piece of code that is capable of copying
11. a local or restricted communications 3. are small files that Web sites put on your itself and typically has a detrimental effect,
network, especially a private network created computer hard disk drive when you first visit such as corrupting the system or destroying data
using World Wide Web software.