-
- Attacks
to Attacks - A cyber attack will be displayed along with 10 words.
Pick the 3 words that are most relevant to the cyber attack.
You only get 3 clicks per question, so choose wisely.
- Attacks
-
Ransomware
- File encryption
- Trojan software
- Firewall rule change
- Workstation shutdown
- LAN cable
- DatabaseBitcoins
- DHCP snooping
- Dark web
- WannaCry
-
SQL injection
- Web servers
- USB plugged in
- File attachment
- Anti-virus software
- Database
- Query
- DNS
- Payload
- Insider threat
-
DDoS
- Cross site scripting
- Fake traffic
- Active Directory
- Botnets
- Mobile devices
- Data encrypted
- Website unavailable
- Switch configuration change
- Blue Screen of Death
- C++
-
Phishing
- Reel and rod
- Privilege abuse
- Etherum
- Admin user
- Imitation
- Firewall denied connections
- Credit card numbers
- Petya
- Non-working hours
-
Cryptojacking
- CPU
- Disk space
- GPO change
- Blockchain
- Document printed
- Administrator privileges
- Failed logons
- Web servers
- BFGminer
- PCI DSS
-
Cool! You're almost done.
-
Thank you!