Exit Quiz
Question 1 of 6
1
of 6
Match the following terms with their definitions:
Click and drag answers to change the order, or select using
↹
Tab
then move by pressing
Space
and the
↑
↓
arrows on your keyboard.
checking and cleaning user input to prevent harmful code
software that manages hardware and allows other programs to run
weaknesses in a system that attackers can exploit
a deliberate attempt to damage or gain unauthorised access to systems
sanitisation
operating system
vulnerabilities
cyberattack
Focus on the purpose of each term.
Need a hint?
Check