Buscar
🇪🇸
MEM
O
RY
.COM
4.37.48
Invitado
Iniciar sesión
Página de inicio
0
0
0
0
0
Crear curso
Cursos
Último juego
Panel
Notificaciones
Clases
Carpetas
Exámenes
Exámenes personalizados
Ayuda
Marcador
Tienda
Premios
Amigos
Asignaturas
Modo oscuro
Identificador de usuario: 999999
Versión: 4.37.48
www.memory.es
Estás en modo de exploración. debe iniciar sesión para usar
MEM
O
RY
Inicia sesión para empezar
Index
»
Computer science
»
Networks
»
Cyber Security Threats
level: Cyber Security Threats
Questions and Answers List
level questions: Cyber Security Threats
Question
Answer
The practice of protecting the computer network or system from digital attacks is called
Cybersecurity
The malicious attempt to damage or steal data by an individual or organization is called
Cyber Threats
IDS stands for
Intrusion Detection System
XSS stands for
Cross-site scripting
The process of encoding messages that allows only the authorized users can access is called _______
Encryption
A flaw in a computer system or network that can leave it to open for exploitation is called
Vulnerability
The malware that prevents access to the users' data or system and demand payment in order to regain access is known as
Ransomware
The malware that designed as a banking Trojan to steal users financial data is known as
Emotet
CIA triad stands for
Confidentiality, integrity and availability
A network is flooded with a large number of invalid requests to make the server unavailable is known as
DDoS Attack