SEARCH
🇬🇧
MEM
O
RY
.COM
4.37.48
Guest
Log In
Â
Homepage
0
0
0
0
0
Create Course
Courses
Last Played
Dashboard
Notifications
Classrooms
Folders
Exams
Custom Exams
Help
Leaderboard
Shop
Awards
Forum
Friends
Subjects
Dark mode
User ID: 999999
Version: 4.37.48
www.memory.com
You are in browse mode. You must login to use
MEM
O
RY
  Log in to start
Index
 »Â
Computer science
 »Â
Networks
 »Â
Cyber Security Threats
level: Cyber Security Threats
Questions and Answers List
level questions: Cyber Security Threats
Question
Answer
The practice of protecting the computer network or system from digital attacks is called
Cybersecurity
The malicious attempt to damage or steal data by an individual or organization is called
Cyber Threats
IDS stands for
Intrusion Detection System
XSS stands for
Cross-site scripting
The process of encoding messages that allows only the authorized users can access is called _______
Encryption
A flaw in a computer system or network that can leave it to open for exploitation is called
Vulnerability
The malware that prevents access to the users' data or system and demand payment in order to regain access is known as
Ransomware
The malware that designed as a banking Trojan to steal users financial data is known as
Emotet
CIA triad stands for
Confidentiality, integrity and availability
A network is flooded with a large number of invalid requests to make the server unavailable is known as
DDoS Attack