More cards in this set

Card 6

Front

Why do hackermen intercept data packets?

Back

Preview of the front of card 6

Card 7

Front

What are the computers used to ddos people called

Back

Preview of the front of card 7

Card 8

Front

What is brute force?

Back

Preview of the front of card 8

Card 9

Front

What kind of methods do Ddossers use to shut down a website?

Back

Preview of the front of card 9

Card 10

Front

What is a simple brute force attack?

Back

Preview of the front of card 10

Card 11

Front

What is a complex brute force attack?

Back

Preview of the front of card 11