Icon Créer jeu Créer jeu

Fill in the Blanks: Network Security Key Terms

Compléter

Test your knowledge of network security terminology with this engaging fill-in-the-blanks game.

Téléchargez la version papier pour jouer

5 fois fait

Créé par

United Kingdom

Top 10 résultats

  1. 1
    jt
    jt
    04:45
    temps
    94
    but
Voulez-vous apparaître dans le Top 10 de ce jeu? pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
game-icon

Completar

Fill in the Blanks: Network Security Key Terms

Test your knowledge of network security terminology with this engaging fill-in-the-blanks game.

Miss Pixie
1

areas find Penetration Testing hack network professionals Organisations weakness

: employ to try and their so that they can of .

2

websites User employees different data levels Levels programs access Access

: Different have of to , and .

3

Encryption decrypted understood key scrambled intercepted data

: is so that it cannot be if . It can only be .

4

captured Forensics Data Network network analysed attack cause packets enter

: are as they the and to find out the of a network .

5

files user copies attach Virus copy opens themselves

- to and themselves when the or a file .

6

Denial flooded firewall data hard Service prevent help useless network

of The is with so it is too to but a can .

7

themselves doing anything Worm copy without user

- the .

8

legitimate software malicious program Trojan pretending

- to be a .