Icon Créer jeu Créer jeu

COMPLETAR HUECOS SEGURIDAD INFORMÁTICA INGLÉS

Compléter

Completar los huecos con las palabras adecuadas

Téléchargez la version papier pour jouer

Âge recommandé: 16 ans
83 fois fait

Créé par

Spain

Top 10 résultats

  1. 1
    01:48
    temps
    100
    but
  2. 2
    01:58
    temps
    100
    but
  3. 3
    04:09
    temps
    100
    but
  4. 4
    Martin
    Martin
    07:06
    temps
    90
    but
  5. 5
    kira
    kira
    02:43
    temps
    88
    but
  6. 6
    xavito
    xavito
    03:11
    temps
    84
    but
  7. 7
    roxana matei
    roxana matei
    06:50
    temps
    74
    but
  8. 8
    roxana matei
    roxana matei
    00:32
    temps
    0
    but
Voulez-vous apparaître dans le Top 10 de ce jeu? pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
game-icon

Completar

COMPLETAR HUECOS SEGURIDAD INFORMÁTICA INGLÉS

Completar los huecos con las palabras adecuadas

PAU GARCIA CARDA
1

Trojan Phishing Spyware Botnet Smishing Ransomware Hoax Adware Cryptojacking Vishing

: False information shared to deceive or trick people .
: A harmful software disguised as something useful or legitimate .
: Software that secretly gathers information about a user's activities .
: Unwanted software that displays advertisements on a computer .
: Malicious software that encrypts files and demands payment for their release .
: A network of compromised computers controlled by a hacker .
: Attempt to trick people into sharing sensitive information by pretending to be a trustworthy source .
: Phishing attacks through SMS or text messages .
: Phishing attacks conducted over voice calls .
: Unauthorized use of someone else's computer to mine cryptocurrency .

2

fake Spam Middle Baiting Man Spoofing in Sniffer Hacker Digital Netiquette Grooming the footprint Deep

: Offering something enticing to manipulate users into taking a harmful action .
: A person who gains unauthorized access to computer systems .
: The trail of online activities and information left by a person .
: Faking the identity of a user or device to gain unauthorized access .
: A cyberattack where a third party intercepts communication between two parties .
: A tool that monitors and captures network traffic .
: Etiquette or manners in online communication .
: Artificially created media , often videos , that appear real but are manipulated .
: Building a relationship with the intent of exploiting or manipulating someone .
: Unwanted and irrelevant messages sent over the internet , usually in large quantities .