Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
When you log in to a computer or device using a username, password, fingerprint, face ID, or other method, the process that is used to verity your identity is called _______________.
a Black Hat Hacker
A White Hat Hacker
a Trojan Horse
a Phishing attack
CoffeeShopWifi
C@p*@m3r!(@#1
Authentication
All of the above
Which of the following is NOT a safe option for wireless internet in your local coffee shop?
a Black Hat Hacker
A White Hat Hacker
a Trojan Horse
a Phishing attack
CoffeeShopWifi
C@p*@m3r!(@#1
Authentication
All of the above
If your computer gets hacked and you have a computer virus that might spread to others in your network what might you do?
a Black Hat Hacker
A White Hat Hacker
a Trojan Horse
a Phishing attack
CoffeeShopWifi
C@p*@m3r!(@#1
Authentication
All of the above
Which of the following is the safest password
a Black Hat Hacker
A White Hat Hacker
a Trojan Horse
a Phishing attack
CoffeeShopWifi
C@p*@m3r!(@#1
Authentication
All of the above
You work for a transportation company and want to protect your systems from harm. Who might you hire to help you?
a Black Hat Hacker
A White Hat Hacker
a Trojan Horse
a Phishing attack
CoffeeShopWifi
C@p*@m3r!(@#1
Authentication
All of the above
You receive an email from Nyntundo saying You Must Be 13 To Play This Game Online. Click on your age from the available links below. This is probably
a Black Hat Hacker
A White Hat Hacker
a Trojan Horse
a Phishing attack
CoffeeShopWifi
C@p*@m3r!(@#1
Authentication
All of the above
You receive a notification that you have won a free game and instructions to click on the link to download it. This could be an example of
a Black Hat Hacker
A White Hat Hacker
a Trojan Horse
a Phishing attack
CoffeeShopWifi
C@p*@m3r!(@#1
Authentication
All of the above
An email message with a request for you to Click Here is probably
a Black Hat Hacker
A White Hat Hacker
a Trojan Horse
a Phishing attack
CoffeeShopWifi
C@p*@m3r!(@#1
Authentication
All of the above
Check it!