{"id":93,"date":"2025-07-22T16:24:39","date_gmt":"2025-07-22T13:24:39","guid":{"rendered":"https:\/\/kibernodas.com\/?page_id=93"},"modified":"2025-09-01T13:17:39","modified_gmt":"2025-09-01T10:17:39","slug":"pratybos","status":"publish","type":"page","link":"https:\/\/kibernodas.com\/lt\/exercises\/","title":{"rendered":"Pratimai"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"93\" class=\"elementor elementor-93\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba61df1 e-flex e-con-boxed e-con e-parent\" data-id=\"ba61df1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1733c57 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"1733c57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Excercises<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bcbb4e elementor-widget elementor-widget-text-editor\" data-id=\"0bcbb4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b>Looking for more information about the terms?<\/b><br \/><em>You&#8217;re only seeing part of the content \u2013 all definitions and explanations can be found in the cards, which you can get <span style=\"text-decoration: underline;\"><a href=\"https:\/\/kibernodas.com\/shop\/\">right here<\/a><\/span>!<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ffe21b elementor-widget elementor-widget-text-editor\" data-id=\"8ffe21b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<b>Click<\/b> on the letter you want on the keyboard below to discover which cybersecurity terms are hidden there.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a675a6d elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"a675a6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M413.1 222.5l22.2 22.2c9.4 9.4 9.4 24.6 0 33.9L241 473c-9.4 9.4-24.6 9.4-33.9 0L12.7 278.6c-9.4-9.4-9.4-24.6 0-33.9l22.2-22.2c9.5-9.5 25-9.3 34.3.4L184 343.4V56c0-13.3 10.7-24 24-24h32c13.3 0 24 10.7 24 24v287.4l114.8-120.5c9.3-9.8 24.8-10 34.3-.4z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10bed2f e-flex e-con-boxed e-con e-parent\" data-id=\"10bed2f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f90daf7 elementor-widget elementor-widget-html\" data-id=\"f90daf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<meta charset=\"UTF-8\">\n\n<style>\n  a {\n    font-family: Verdana, sans-serif !important;\n    font-size: 14px;\n    color: #0077a1;\n  }\n\n  strong {\n    font-family: Verdana, sans-serif !important;\n    font-size: 14px;\n  }\n\n  a:hover {\n    color: #005c7e;\n  }\n\n  .letter-buttons {\n    display: flex;\n    flex-wrap: wrap;\n    gap: 12px;\n    margin-bottom: 10px;\n    justify-content: center;\n  }\n\n  .letter-buttons button {\n    width: 50px;\n    height: 50px;\n    padding: 0;\n    border-radius: 10px;\n    border: 1px solid #0077a1;\n    background: #ffffff;\n    box-shadow: 0 2px 5px rgba(0,0,0,0.08);\n    font-size: 18px;\n    font-weight: 500;\n    color: #002942;\n    transition: all 0.15s ease-in-out;\n    cursor: pointer;\n    position: relative;\n    font-family: 'Poppins', sans-serif;\n  }\n\n  .letter-buttons button:hover {\n    background: #f0f6f9;\n    box-shadow: 0 2px 8px rgba(0, 119, 161, 0.25);\n  }\n\n  .letter-buttons button:active {\n    transform: scale(0.95) translateY(1px);\n    box-shadow: inset 0 1px 3px rgba(0,0,0,0.2);\n    background-color: #dbeaf2;\n  }\n\n  .letter-buttons button.active {\n    background-color: #0077a1;\n    border-color: #005c7e;\n    color: #ffffff;\n  }\n\n  .letter-buttons .spacebar {\n    width: 300px;\n    text-align: center;\n    margin-bottom: 50px;\n  }\n\n  .virus-list {\n    display: none;\n    width: 100%;\n    max-width: 1000px;\n    margin: 0 auto 20px;\n    padding: 30px;\n    background: #f4f9fc;\n    border-left: 5px solid #0077a1;\n    border-radius: 8px;\n    font-size: 14px;\n    line-height: 1.6;\n    color: #002942;\n    box-shadow: 0 2px 6px rgba(0,0,0,0.05);\n    font-family: Verdana, sans-serif;\n  }\n\n  .virus-list.active {\n    display: block;\n  }\n  \n  @media screen and (max-width: 480px) {\n  .letter-buttons {\n    gap: 4px;\n  }\n\n  .letter-buttons button {\n    width: 30px;\n    height: 39px;\n    font-size: 16px;\n  }\n\n  .letter-buttons .spacebar {\n    width: 60%;\n    font-size: 16px;\n  }\n}\n<\/style>\n\n\n<div class=\"letter-buttons\">\n  <button data-letter=\"A\">A<\/button>\n  <button data-letter=\"B\">B<\/button>\n  <button data-letter=\"C\">C<\/button>\n  <button data-letter=\"D\">D<\/button>\n  <button data-letter=\"E\">E<\/button>\n  <button data-letter=\"F\">F<\/button>\n  <button data-letter=\"G\">G<\/button>\n  <button data-letter=\"H\">H<\/button>\n  <button data-letter=\"I\">I<\/button>\n  <button data-letter=\"J\">J<\/button>\n<\/div>\n<div class=\"letter-buttons\">\n  <button data-letter=\"K\">K<\/button>\n  <button data-letter=\"L\">L<\/button>\n  <button data-letter=\"M\">M<\/button>\n  <button data-letter=\"N\">N<\/button>\n  <button data-letter=\"O\">O<\/button>\n  <button data-letter=\"P\">P<\/button>\n  <button data-letter=\"Q\">Q<\/button>\n  <button data-letter=\"R\">R<\/button>\n  <button data-letter=\"S\">S<\/button>\n<\/div>\n<div class=\"letter-buttons\">\n  <button data-letter=\"T\">T<\/button>\n  <button data-letter=\"U\">U<\/button>\n  <button data-letter=\"V\">V<\/button>\n  <button data-letter=\"W\">W<\/button>\n  <button data-letter=\"X\">X<\/button>\n  <button data-letter=\"Y\">Y<\/button>\n  <button data-letter=\"Z\">Z<\/button>\n<\/div>\n<div class=\"letter-buttons\">\n  <button data-letter=\"SPACE\" class=\"spacebar\">Preface<\/button>\n<\/div>\n\n<div id=\"virus-lists\">\n  <div class=\"virus-list\" id=\"list-A\">\n    <strong>A<\/strong> \u2013 <strong>Antivirus<\/strong> \u2013 Antivirusin\u0117 programa.<br>\n    2 Test virus: <a target=\"_blank\" href=\"https:\/\/www.ikarussecurity.com\/en\/private-customers\/download-test-viruses-for-free\/\">https:\/\/www.ikarussecurity.com\/en\/private-customers\/download-test-viruses-for-free\/<\/a><br>\n    3 Virus-mimicking file: <a target=\"_blank\" href=\"https:\/\/secure.eicar.org\/eicar.com.txt\">https:\/\/secure.eicar.org\/eicar.com.txt<\/a>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-B\">\n    <strong>B <\/strong> \u2013<strong>Backup<\/strong> \u2013 Atsargin\u0117 kopija.\n  <\/div>\n  <div class=\"virus-list\" id=\"list-C\">\n    <strong>C<\/strong> \u2013 <strong>Cyberbullying<\/strong> \u2013 Kibernetin\u0117s paty\u010dios.<br>\n    Cyberbullying, threats on social networks \u2013 is it possible to stop them?<br>\n    4 <a target=\"_blank\" href=\"https:\/\/www.vaikulinija.lt\">https:\/\/www.vaikulinija.lt<\/a><br>\n    5 <a target=\"_blank\" href=\"https:\/\/www.facebook.com\/watch\/?v=782036312325842\">https:\/\/www.facebook.com\/watch\/?v=782036312325842<\/a><br>\n    6 <a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=RPcazzTuz3I\">https:\/\/www.youtube.com\/watch?v=RPcazzTuz3I<\/a><br>\n    7 <a target=\"_blank\" href=\"https:\/\/www.vaikulinija.lt\/vaikams-paaugliams\/elektronines-patycios-ar-imanoma-jas-sustabdyti\/\">https:\/\/www.vaikulinija.lt\/vaikams-paaugliams\/elektronines-patycios-ar-imanoma-jas-sustabdyti\/<\/a>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-D\">\n    <strong>D<\/strong> - <strong>DDoS Attack<\/strong> - Paskirstyta paslaug\u0173 trikdymo ataka.<br>\n    8 National Cyber Security Centre (NCSC): <a target=\"_blank\" href=\"https:\/\/www.nksc.lt\/tikrinti.html\">https:\/\/www.nksc.lt\/tikrinti.htmldownload-test-viruses-for-free\/<\/a>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-E\">\n    <strong>E<\/strong> - <strong>Exploit<\/strong> - I\u0161naudojimas.<br>\n    9 NIST National Vulnerability Database: <a target=\"_blank\" href=\"https:\/\/nvd.nist.gov\/vuln\/search\">https:\/\/nvd.nist.gov\/vuln\/search<\/a>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-F\">\n    <strong>F<\/strong> \u2013 <strong>FOMO (Fear of missing out)<\/strong> - Baim\u0117 praleisti.<br>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-G\">\n    <strong>G<\/strong> - <strong>Genie<\/strong> - Nesusivaldymas internete.<br>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-H\">\n    <strong>H<\/strong> - <strong>Hacker<\/strong> - \u012esilau\u017e\u0117lis, programi\u0161ius.<br>\n    10 Encode, decode text: <a target=\"_blank\" href=\"https:\/\/www.dcode.fr\/caesar-cipher\">https:\/\/www.dcode.fr\/caesar-cipher<\/a>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-I\">\n    <strong>I<\/strong> - <strong>Identity (Digital)<\/strong> - Tapatyb\u0117 (internete).<br>\n    11 Digital footprint: <a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=F4WZ_k0vUDM\">https:\/\/www.youtube.com\/watch?v=F4WZ_k0vUDM<\/a>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-J\">\n    <strong>J<\/strong> - <strong>Jamming<\/strong> \u2013 Trikdymas.\n  <\/div>\n  <div class=\"virus-list\" id=\"list-K\">\n    <strong>K<\/strong> - <strong>Keylogger<\/strong> - Klaviat\u016bros registratoriai.\n  <\/div>\n  <div class=\"virus-list\" id=\"list-L\">\n    <strong>L<\/strong> - <strong>Local Access<\/strong> - Vietin\u0117 prieiga.\n  <\/div>\n  <div class=\"virus-list\" id=\"list-M\">\n    <strong>M<\/strong> - <strong>Machine learning<\/strong> - Ma\u0161ininis mokymasis.<br>\n    DRAWING MODELS:<br>\n    12 <a target=\"_blank\" href=\"https:\/\/www.autodraw.com\/\">https:\/\/www.autodraw.com\/<\/a><br>\n    13 <a target=\"_blank\" href=\"https:\/\/quickdraw.withgoogle.com\/\">https:\/\/quickdraw.withgoogle.com\/<\/a><br>\n    14 <a target=\"_blank\" href=\"https:\/\/quickdraw.withgoogle.com\/data\">https:\/\/quickdraw.withgoogle.com\/data<\/a><br>\n    15 Machine learning model: <a target=\"_blank\" href=\"https:\/\/machinelearningforkids.co.uk\/\">https:\/\/machinelearningforkids.co.uk\/<\/a>\n  <\/div>\n    <div class=\"virus-list\" id=\"list-N\">\n    <strong>N<\/strong> - <strong>Network<\/strong> \u2013 Tinklas.\n  <\/div>\n  <div class=\"virus-list\" id=\"list-O\">\n    <strong>O<\/strong> - <strong>Operating system<\/strong> - Operacin\u0117 sistema.<br>\n    Operating systems:<br>\n    16 <a target=\"_blank\" href=\"https:\/\/ubuntu.com\/download\">https:\/\/ubuntu.com\/download<\/a><br>\n    17 <a target=\"_blank\" href=\"https:\/\/lt.linux-console.net\/?p=371#gsc.tab=0\">https:\/\/lt.linux-console.net\/?p=371#gsc.tab=0<\/a>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-P\">\n    <strong>P<\/strong> - <strong>Password<\/strong> \u2013 Slapta\u017eodis.<br>\n    Guess the password:<br>\n    18 <a target=\"_blank\" href=\"https:\/\/mima112.eu\/web_sauga\/pass\">https:\/\/mima112.eu\/web_sauga\/pass<\/a><br>\n    19 <a target=\"_blank\" href=\"https:\/\/www.passwordmonster.com\/\">https:\/\/www.passwordmonster.com\/<\/a><br>\n    20 <a target=\"_blank\" href=\"hhttps:\/\/colab.research.google.com\/drive\/1s3cLOfN31Iz6WytxXxxOu2qOUZcUPGEL?usp=sharing\">https:\/\/colab.research.google.com\/drive\/1s3cLOfN31Iz6WytxXxxOu2qOUZcUPGEL?usp=sharing<\/a>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-Q\">\n    <strong>Q <\/strong>- <strong>Quarantine<\/strong> \u2013 Karantinas.\n  <\/div>\n  <div class=\"virus-list\" id=\"list-R\">\n    <strong>R<\/strong> - <strong>Ransomware<\/strong> -\u00a0I\u0161pirkos reikalaujanti programin\u0117 \u012franga.\n  <\/div>\n  <div class=\"virus-list\" id=\"list-S\">\n    <strong>S<\/strong> - <strong>Social Engineering<\/strong> - Socialin\u0117 in\u017einerija.\n  <\/div>\n  <div class=\"virus-list\" id=\"list-T\">\n    <strong>T<\/strong> - <strong>Trolling<\/strong> - \u201eTrolinimas\u201c.<br>\n    21 Trolling test: <a target=\"_blank\" href=\"https:\/\/spotthetroll.org\">https:\/\/spotthetroll.org<\/a>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-U\">\n    <strong>U<\/strong> - <strong>Update<\/strong> - Atnaujinimas.<br>\n    22 AV-TEST institute: <a target=\"_blank\" href=\"https:\/\/www.av-test.org\/en\/statistics\/malware\/\">https:\/\/www.av-test.org\/en\/statistics\/malware\/<\/a>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-V\">\n    <strong>V<\/strong> - <strong>VPN (Virtual Private Network)<\/strong> - Virtualus privatus tinklas.<br>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-W\">\n    <strong>W<\/strong> - <strong>Webcam<\/strong> - Internetin\u0117 vaizdo kamera.\n  <\/div>\n  <div class=\"virus-list\" id=\"list-X\">\n    <strong>X<\/strong> - <strong>XDR (eXtended Detection and response)<\/strong> - I\u0161pl\u0117stinis aptikimas ir reagavimas.\n  <\/div>\n  <div class=\"virus-list\" id=\"list-Y\">\n    <strong>Y<\/strong> - <strong>YubiKey<\/strong> \u2013 YubiKey.\n  <\/div>\n  <div class=\"virus-list\" id=\"list-Z\">\n    <strong>Z<\/strong> - <strong>Zero Day Attack<\/strong> - Nulin\u0117s dienos ataka.<br>\n    Vulnerability databeses:<br>\n    23 <a target=\"_blank\" href=\"https:\/\/cve.mitre.org\/index.html\">https:\/\/cve.mitre.org\/index.html<\/a><br>\n    24 <a target=\"_blank\" href=\"https:\/\/nvd.nist.gov\/vuln\">https:\/\/nvd.nist.gov\/vuln<\/a>\n  <\/div>\n  <div class=\"virus-list\" id=\"list-SPACE\">\n    <strong>Preface<\/strong><br>\n    1 Encyclopedia: <a target=\"_blank\" href=\"https:\/\/www.vle.lt\/straipsnis\/kibernetinis-saugumas\/\">https:\/\/www.vle.lt\/straipsnis\/kibernetinis-saugumas\/<\/a>\n  <\/div>\n<\/div>\n\n<script>\n  document.querySelectorAll(\".letter-buttons button\").forEach(button => {\n    button.addEventListener(\"click\", () => {\n      const letter = button.dataset.letter;\n\n      \/\/ Pa\u0161alinti aktyvumo \u017eym\u0119 i\u0161 vis\u0173 mygtuk\u0173\n      document.querySelectorAll(\".letter-buttons button\").forEach(btn => btn.classList.remove(\"active\"));\n      button.classList.add(\"active\");\n\n      \/\/ Sl\u0117pti visus virus\u0173 s\u0105ra\u0161us\n      document.querySelectorAll(\".virus-list\").forEach(list => list.classList.remove(\"active\"));\n\n      \/\/ Rodyti tik pasirinktos raid\u0117s s\u0105ra\u0161\u0105\n      const active = document.getElementById(\"list-\" + letter);\n      if (active) {\n        active.classList.add(\"active\");\n\n        \/\/ Scrollinti\n        const yOffset = -430;\n        const y = active.getBoundingClientRect().top + window.pageYOffset + yOffset;\n        window.scrollTo({ top: y, behavior: 'smooth' });\n      }\n    });\n  });\n\n  window.addEventListener(\"DOMContentLoaded\", () => {\n    const spaceButton = document.querySelector('button[data-letter=\"SPACE\"]');\n    if (spaceButton) {\n      spaceButton.classList.add(\"active\");\n      const spaceList = document.getElementById(\"list-SPACE\");\n      if (spaceList) {\n        spaceList.classList.add(\"active\");\n      }\n    }\n  });\n<\/script>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Excercises Looking for more information about the terms?You&#8217;re only seeing part of the content \u2013 all definitions and explanations can [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-93","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exercises - KiberNODAS<\/title>\n<meta name=\"description\" content=\"Explore KiberNODAS exercises: A\u2013Z cybersecurity practice with links to antivirus tests, password strength checks, trolling test and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibernodas.com\/lt\/pratybos\/\" \/>\n<meta property=\"og:locale\" content=\"lt_LT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exercises - KiberNODAS\" \/>\n<meta property=\"og:description\" content=\"Explore KiberNODAS exercises: A\u2013Z cybersecurity practice with links to antivirus tests, password strength checks, trolling test and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibernodas.com\/lt\/pratybos\/\" \/>\n<meta property=\"og:site_name\" content=\"KiberNODAS\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T10:17:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minut\u0117s\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kibernodas.com\\\/exercises\\\/\",\"url\":\"https:\\\/\\\/kibernodas.com\\\/exercises\\\/\",\"name\":\"Exercises - KiberNODAS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kibernodas.com\\\/lt\\\/#website\"},\"datePublished\":\"2025-07-22T13:24:39+00:00\",\"dateModified\":\"2025-09-01T10:17:39+00:00\",\"description\":\"Explore KiberNODAS exercises: A\u2013Z cybersecurity practice with links to antivirus tests, password strength checks, trolling test and more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kibernodas.com\\\/exercises\\\/#breadcrumb\"},\"inLanguage\":\"lt-LT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kibernodas.com\\\/exercises\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kibernodas.com\\\/exercises\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kibernodas.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exercises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kibernodas.com\\\/lt\\\/#website\",\"url\":\"https:\\\/\\\/kibernodas.com\\\/lt\\\/\",\"name\":\"KiberNODAS\",\"description\":\"Kibernetinis saugumo skydas tavo rankose.\",\"publisher\":{\"@id\":\"https:\\\/\\\/kibernodas.com\\\/lt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kibernodas.com\\\/lt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"lt-LT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/kibernodas.com\\\/lt\\\/#organization\",\"name\":\"KiberNODAS\",\"url\":\"https:\\\/\\\/kibernodas.com\\\/lt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\\\/\\\/kibernodas.com\\\/lt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/kibernodas.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Site_icon.webp\",\"contentUrl\":\"https:\\\/\\\/kibernodas.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Site_icon.webp\",\"width\":512,\"height\":512,\"caption\":\"KiberNODAS\"},\"image\":{\"@id\":\"https:\\\/\\\/kibernodas.com\\\/lt\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pratimai - KiberNODAS","description":"I\u0161nagrin\u0117kite KiberNODAS pratybas: Kibernetinio saugumo pratybos nuo A iki Z su nuorodomis \u012f antivirusinius testus, slapta\u017eod\u017ei\u0173 stiprumo patikrinimus, trolinimo test\u0105 ir kt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibernodas.com\/lt\/pratybos\/","og_locale":"lt_LT","og_type":"article","og_title":"Exercises - KiberNODAS","og_description":"Explore KiberNODAS exercises: A\u2013Z cybersecurity practice with links to antivirus tests, password strength checks, trolling test and more.","og_url":"https:\/\/kibernodas.com\/lt\/pratybos\/","og_site_name":"KiberNODAS","article_modified_time":"2025-09-01T10:17:39+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minut\u0117s"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kibernodas.com\/exercises\/","url":"https:\/\/kibernodas.com\/exercises\/","name":"Pratimai - KiberNODAS","isPartOf":{"@id":"https:\/\/kibernodas.com\/lt\/#website"},"datePublished":"2025-07-22T13:24:39+00:00","dateModified":"2025-09-01T10:17:39+00:00","description":"I\u0161nagrin\u0117kite KiberNODAS pratybas: Kibernetinio saugumo pratybos nuo A iki Z su nuorodomis \u012f antivirusinius testus, slapta\u017eod\u017ei\u0173 stiprumo patikrinimus, trolinimo test\u0105 ir kt.","breadcrumb":{"@id":"https:\/\/kibernodas.com\/exercises\/#breadcrumb"},"inLanguage":"lt-LT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibernodas.com\/exercises\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibernodas.com\/exercises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibernodas.com\/"},{"@type":"ListItem","position":2,"name":"Exercises"}]},{"@type":"WebSite","@id":"https:\/\/kibernodas.com\/lt\/#website","url":"https:\/\/kibernodas.com\/lt\/","name":"KiberNODAS","description":"Kibernetinis saugumo skydas tavo rankose.","publisher":{"@id":"https:\/\/kibernodas.com\/lt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibernodas.com\/lt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"lt-LT"},{"@type":"Organization","@id":"https:\/\/kibernodas.com\/lt\/#organization","name":"KiberNODAS","url":"https:\/\/kibernodas.com\/lt\/","logo":{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/kibernodas.com\/lt\/#\/schema\/logo\/image\/","url":"https:\/\/kibernodas.com\/wp-content\/uploads\/2025\/07\/Site_icon.webp","contentUrl":"https:\/\/kibernodas.com\/wp-content\/uploads\/2025\/07\/Site_icon.webp","width":512,"height":512,"caption":"KiberNODAS"},"image":{"@id":"https:\/\/kibernodas.com\/lt\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/kibernodas.com\/lt\/wp-json\/wp\/v2\/pages\/93","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibernodas.com\/lt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kibernodas.com\/lt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kibernodas.com\/lt\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/kibernodas.com\/lt\/wp-json\/wp\/v2\/comments?post=93"}],"version-history":[{"count":0,"href":"https:\/\/kibernodas.com\/lt\/wp-json\/wp\/v2\/pages\/93\/revisions"}],"wp:attachment":[{"href":"https:\/\/kibernodas.com\/lt\/wp-json\/wp\/v2\/media?parent=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}