Лёгкое задание, но нет времени на него, помогите)
Use the words and expressions below to complete the sentences.

password cracker, router, white hat, phone network, damage, sensitive information, exploit, black hat, hacking tool, server

1. In the case of a ______________, the data is transmitted not to a central hub in a small network of devices (as it is with Wi-Fi) or even directly from device to device (as it is with Bluetooth), but through a global network of transmitters and receivers.
2. An example of a ______________ is a computer worm.
3. A ______________ may include a firewall, VPN handling, and other security functions, or these may be handled by separate devices.
4. ______________ can be used to recover a forgotten password.
5. The scale of the ______________ depends on the targets of the virus and sometimes the results of its activity are imperceptible.
6. A ______________ hacker may work as a consultant or be a permanent employee on a company's payroll.
7. A local ______________ requires prior access to the vulnerable system and usually increases the privileges past those granted by the system administrator.
8. The purpose of a ______________ is to share data as well as to share resources and distribute work.
9. The credit card files of the company's customers were very ______________, so they hired a team of experts to devise security measures for it.
10. ______________ hackers can inflict major damage on both individual computer users and large organizations by stealing personal financial information, compromising the security of major systems, or shutting down or altering the function of websites and networks.
Please enter comments
Please enter your name.
Please enter the correct email address.
You must agree before submitting.

Answers & Comments


Copyright © 2024 SCHOLAR.TIPS - All rights reserved.