This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Ocean 6

| See more in IT Security

You answer to win or You lose to answer

Created Date 06.05.21
Last Updated 06.07.21
Viewed 7 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Would you like to build your own game?

It's easy!

Go to the GameBuilder and get started!

Topics of this game:
  • Which action can help reduce online risk?
  • What is a wireless router security best practice that limits access to only specific internal hosts?
  • An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?
  • How can a virtual assistant be a security risk?
  • What is a goal of performing a risk assessment?
  • Why would an IT person use Zabad search?
  • How are USB flash drives a security risk?
  • What is a open public wireless network?
  • Who collect data for nefarious reasons?
  • What two areas of data center physical security?
  • A secure encrypted tunnel
  • Wireless network name that should be changed.
  • What should contain mix of letters, numbers, and special characters?
  • What allows only approved devices onto the wireless network?