Cybersecurity Tech Terms, Part 5

Edit Answers
QRNGQZBSXPUKCABLATNEMERCNIULOD TZNRHPYUWATICUNQCCJLHRITRRQNJN LVZUQDJTBHMHKDZVHWSLJKVUDEIONA XCYBERLOAFINGEXPLOITKITSWKHIOO NENXSVHPLENSTEALINGDATAGACNTIW SFDXMUQUEKVAIPQKWOXGTHTWTOXCTG HUHRIVGXKWAACFINGERPRINTGLOEIO CYBERSLACKINGSCLLNSHHVONEBFTNZ PTLENFEMMTKQRASBZIMJCRIASPUOGS QPUKCABLAITRAPSIRYNKBBBCTULROV EPANONYMOUSWEBSURFINGMDSUPLPCV TWYYJZOTFHQMEIEKDIKAMFBSROBAES JDRIVEBYDOWNLOADYGAHLZAUEPATRC GDBNNFSDMARGORPROODKCABRHQCALV BIOMETRICAUTHENTICATIONIWJKDAF OPRPGBERUTANGISSURIVUTJVXKUQIS YSLOOTYCAVIRPRESWORBPATUWQPECA JHJPSCISNEROFLATIGIDSUIRIUYSAA EJQORJUNEXBCTVIRUSDEFINITIONFR QABIOBZLDMSLFZRAYBKPMTYSTVVONW
1.
PopUpBlocker
2.
VirusSignature
3.
VirusDefinition
4.
VirusScan
5.
DriveByDownload
6.
BiometricAuthentication
7.
Fingerprint
8.
Gesture
9.
FacialRecognition
10.
IrisScan
11.
BrowserPrivacyTools
12.
AnonymousWebSurfing
13.
FullBackup
14.
IncrementalBackup
15.
PartialBackup
16.
DigitalForensics
17.
RaaS
18.
Cyberslacking
19.
Cyberloafing
20.
BackdoorProgram
21.
ExploitKits
22.
StealingData
23.
DataProtection
24.
UPS