Review 10 Flashcards
(10 cards)
What is unauthorized access?
Accessing systems or files without permission.
Which of the following is unauthorized use?
Using company resources for personal activities.
What does a firewall do?
Prevents unauthorized network access.
What is two- factor authentication?
Using two different verification methods.
Which of the following is considered malware?
Ransomware.
What is phishing?
Tricking users into revealing private data via fake emails.
What is pharming?
Redirecting users to fake websites via DNS manipulation.
Which of these is a common social engineering tactic in Cambodia?
Pretending to be a family member and asking for money.
A VPN provides:
Encrypted access to a private network over the internet.
Which access system uses fingerprint or iris recognition?
Biometric access.