cybersecurity Awareness Month Week 2 2025

Edit Answers
AFNEGCMHITGFCBARINDO HOPUTKXBNROTCAFITLUM HWZOHPCDQRHIZCEPALSA AYRWLSDRNTSPBOFKASOU UACLXISHFMYWRNWROWPS TUWJZQCMQMSIUFIOTAEP HYQJYGEYUUTDTIFWSCRE EUWBTTCXZGEOEDWTUSAA NIASJENQCTMGFEHEBITR TGDOYVSVCFPVONANSWIP IRYDHOCILYUTRTLVNWNH CGRDYJRMANTLCIIEFFGI AMPWLTRZPXXXEANXTZSS TYRYSNSTTCFUDLGYVUWH INBECSICOZABWLINUXFI OQRURDCBPBUGBOUNTYUN NYWLRRMZVAEAQUKCCQYG TMRNMBBGHXRRELJYYRVQ GWRFEITVISVFHPLOQJMB DTFOPQKEWWUSPIYYAWIB
1.
Confidential
2.
Restricted
3.
Laptop
4.
Multifactor
5.
DDOS
6.
Policy
7.
Linux
8.
Operating
9.
System
10.
Bugbounty
11.
Spearphishing
12.
Whaling
13.
BruteForce
14.
Network
15.
Authentication