Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
A collection of internet-connected programs communicating with other similar programs in order to perform tasks. Botnets can be used to send spam or participate in a Distributed Denial of Service attacks.
Authentication
Firewall
Spyware
Hacker
Botnet
Denial of Service (DoS) or Distributed Denial of Service (DDoS)
Password
Trojan Horse
It is a type of malware that collects user information by tracking the habits of users
Authentication
Firewall
Spyware
Hacker
Botnet
Denial of Service (DoS) or Distributed Denial of Service (DDoS)
Password
Trojan Horse
A string of characters that allows access to a computer, interface, or system.
Authentication
Firewall
Spyware
Hacker
Botnet
Denial of Service (DoS) or Distributed Denial of Service (DDoS)
Password
Trojan Horse
Computer program hidden within the shell of another program with an alternative intent such as a virus.
Authentication
Firewall
Spyware
Hacker
Botnet
Denial of Service (DoS) or Distributed Denial of Service (DDoS)
Password
Trojan Horse
The process of verifying that you are who you say you are
Authentication
Firewall
Spyware
Hacker
Botnet
Denial of Service (DoS) or Distributed Denial of Service (DDoS)
Password
Trojan Horse
A physical device or application designed to deny incoming or outgoing traffic on a network.
Authentication
Firewall
Spyware
Hacker
Botnet
Denial of Service (DoS) or Distributed Denial of Service (DDoS)
Password
Trojan Horse
It is a person who gains unauthorized access to a computing device or network.
Authentication
Firewall
Spyware
Hacker
Botnet
Denial of Service (DoS) or Distributed Denial of Service (DDoS)
Password
Trojan Horse
An attempt to make a machine or network resource unavailable to its intended users
Authentication
Firewall
Spyware
Hacker
Botnet
Denial of Service (DoS) or Distributed Denial of Service (DDoS)
Password
Trojan Horse
Check it!