1.
I am complicated and I should be strong, I need changes frequently, keep me safe or if you miss me am sure you will be in trouble. Who am I?
WSOPSDAR
2.
Tap me and you are “IN” & “OUT”. Be careful no one tails along because I am meant for a one-person use. Who am I?
CRASACDCSE
3.
I am the basic to protection of your data/information. I have lot of controls, the more controls you give me the more _____________ I provide. What am I?
IRUETYSC
4.
I come to you unexpected. I ensure to make you feel am important, I manipulate you to trust me, but you are always warned to not trust me. Who am I?
ISHHPNGI
5.
I am a ciphertext. I secure your data during transmission. You lock me with a secret key. Who am I?
IENYPTNORC
6.
I am saved on a regular interval for future uses, I can stay on a drive, a server or on cloud. Who am I?
UBPAKC
7.
I am a computer program. I protect your system and prevent threats. Who am I?
TIISUNVRA
8.
I do not care about the protocol, knowingly or accidentally I forget to use my access card, I like to just follow some one and get into an access-controlled area. What am I?
ATGILNGTIA
9.
I monitor your network, I am stuck in between your network and the internet (WAN). But I am glad that I protect your network
RWILLEAF
10.
I am a weakness, I can remain unidentified and silent. If you do not fix me your information can be compromised