New Activity
Play Fill in the Blanks Game
1 . The Pillars of ____________________ are ____________________ , integrity , and availability .

2 . A ____________________ is a known or unknown ____________________ in a website that could result in the loss of a website's confidentiality , integrity , and / or availability .

3 . A ____________________ is a likelihood that a threat will exploit ____________________ and cause damage , or danger , to a customer's website or its visitors . Risk can be ____________________ through preemptive action .

4 . A threat is what could take ____________________ of a website's vulnerabilities and result in a loss of a website's confidentiality , integrity , and / or availability .

5 . A website ____________________ ( or a hack ) is when a threat has exploited a vulnerability in a website and has affected a website's confidentiality , integrity , and / or availability .

6 . ____________________ is short for malicious software . It is put on a website without the owner's ____________________ or knowledge and is intended to ____________________ or ____________________ a website or the visitors to it .

7 . A ____________________ , also known as a crawler or spider , is a program or automated script that browse the Internet with a specific purpose and is completely automated .

8 . ____________________ is the process of crawling a website with the intent of stealing original content .

9 . SEO stands for ____________________ ____________________ ____________________ and consist of various techniques employed to raise a site or page rank with popular search engines .

10 . ____________________ ____________________ are input fields that are usually used in a form that is part of a webpage .

11 . A search engine , like Google , Bing , Yahoo , etc . will ____________________ you if they crawl a website for indexing and rankings but find malware .

12 . ____________________ is attempting to obtain sensitive information for malicious reasons by acting as a trustworthy entity .

13 . DDoS stands for ____________________ ____________________ ____________________ ____________________ and tries to shut down a server , or website , by trying to overwhelm it and make it inaccessible by flooding it with malicious , or fake , requests .

14 . WAF stands for ____________________ ____________________ ____________________ and is used to block malicious traffic , or requests , in order to protect websites from hackers , bots , scrapers , and spammers .

15 . A SQL Injection ( SQLi ) compromise happens when malicious ____________________ ____________________ , or commands , are inserted into an entry field of a website in order to attack the ____________________ of the site .

16 . XSS stands for ____________________ - ____________________ ____________________ and is a compromise that happens when ____________________ and / or ____________________ is inserted into an entry field of a website in order to alter the functionality of the site and launch ____________________ attacks on website visitors .

17 . A ____________________ compromise is commonly referred to as a . htaccess hack , which is the file that is affected . This occurs when a website is accessed online but the visitor is taken to an unintended site .

18 . A . ____________________ file is used to define directory and file permissions , establish URL rewrite rules , improve search engine optimization , and / or contain custom error messages .

19 . A ____________________ ____________________ is commonly found on sites that have had several attacks within a small period and allows hackers easy access to a website ; they can come and go as they please .

20 . A ____________________ compromise occurs when a website is replaced with a site that a hacker puts up , commonly a one - page site glorifying the hacker , hacking group , and / or displays an opinion or belief of the hacker .

21 . The ____________________ ____________________ is the file within a website that is in charge of displaying the initial page ( home page ) you see when a website is viewed .

22 . A spam / SEO compromise will have ____________________ for things like pharma , Gucci , Nike , Prada , etc . , by way of backlinks , hyperlinks , or headers on a website .

23 . A ____________________ is a challenge - response test used in computing as an attempt to ensure that the response is generated by a human being .

24 . A ____________________ ____________________ compromise will directly or indirectly link a website to a blacklisted website . The goal of this compromise it to get the infected site ____________________ as well .