This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Cyber Security Slugger

Lets learn about cyber security together!

lethariostovel
By
Created Date 04.04.22
Last Updated 04.05.22
Viewed 8 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit
0

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • What does PII stand for?
  • Information that can identify, contact, or locate a specific individual refers to what?
  • What is the role of a black hat hacker?
  • Are black hat hackers good people?
  • What is the role of a white hat hacker?
  • Are white hat hackers good people?
  • Where are the two areas of data center physical security?
  • What does VPN stand for?
  • Give one example of a secured encrypted tunnel.
  • The wireless network name that should be changed is called?
  • What should contain mix of letters, numbers, and special characters?
  • What allows only approved devices onto the wireless network?
  • What is the security best practice to value assets to justify expenditures called?
  • Fire alarms, UPS systems, and HVAC systems are an example of what kind of security measures?
  • Name one example of an open public network. (Hint: Apple users use it often)

User comments are currently unavailable. We apologize for the inconvenience and are working to restore this feature as soon as possible.