- 1. A TERM USED TO DESCRIBE ACTIONS TAKEN BY SOMEONE TO GAIN UNAUTHORIZED ACCESS TO A COMPUTER
A) malware B) Hacking C) Pharming
- 2. FIND WEAKNESSES (OR PRE-EXISTING BUGS) IN YOUR SECURITY SETTINGS AND EXPLOIT THEM IN ORDER TO ACCESS YOUR INFORMATION
A) Hacking B) Warming C) Pharming
- 3. INSTALL A TROJAN HORSE, PROVIDING A BACK DOOR FOR HACKERS TO ENTER AND SEARCH FOR YOUR INFORMATION
A) Hacking B) Pharming C) Trojan horse
- 4. ONE OF THE MORE COMMON WAYS TO INFILTRATE OR DAMAGE YOUR COMPUTER
A) HARDWARE B) SOFTWARE C) MALWARE
- 5. MALICIOUS SOFTWARE THAT INFECTS YOUR COMPUTER, SUCH AS COMPUTER VIRUSES, WORMS, TROJAN HORSES, SPYWARE, AND ADWARE
A) PHARMING B) MALWARE C) HACKING
- 6. INTIMIDATE YOU WITH SCAREWARE, WHICH IS USUALLY A POP-UP MESSAGE THAT TELLS YOU YOUR COMPUTER HAS A SECURITY PROBLEM OR OTHER FALSE INFORMATION
A) MALWARE B) TROJAN HORSE C) HACKING
- 7. CONVINCE YOU THAT THE SITE IS REAL AND LEGITIMATE BY SPOOFING OR LOOKING ALMOST IDENTICAL TO THE ACTUAL SITE DOWN TO THE SMALLEST DETAILS. YOU MAY ENTER YOUR PERSONAL INFORMATION AND UNKNOWINGLY GIVE IT TO SOMEONE WITH MALICIOUS INTENT
A) TROJAN HORSE B) PHARMING C) HACKING
- 8. A COMMON TYPE OF ONLINE FRAUD.
A) USING B) HACKING C) PHARMING
- 9. A MEANS TO POINT YOU TO A MALICIOUS AND ILLEGITIMATE WEBSITE BY REDIRECTING THE LEGITIMATE URL EVEN IF THE URL IS ENTERED CORRECTLY, IT CAN STILL BE REDIRECTED TO A FAKE WEBSITE
A) MALWARE B) PHARMING C) HACKING
- 10. REFORMAT THE HARD DRIVE OF YOUR COMPUTER CAUSING YOU TO LOSE ALL YOUR INFORMATION
A) SPAM B) MALWARE C) TROJAN HORSE
- 11. ALTER OR DELETE FILES
A) SPAM B) MALWARE C) ICT
- 12. STEAL SENSITIVE INFORMATION
A) HACKING B) SPAM C) MALWARE
- 13. TAKE CONTROL OF YOUR COMPUTER AND ALL THE SOFTWARE RUNNING ON IT.
A) Malware B) Hacking C) Software
- 14. USED MOST OFTEN BY CYBER CRIMINALS BECAUSE IT'S EASY TO EXECUTE AND CAN PRODUCE THE RESULTS THEY'RE LOOKING FOR WITH VERY LITTLE EFFORT.
A) FISHING B) PHISHING C) PISING
- 15. FAKE EMAILS, TEXT MESSAGES AND WEBSITES CREATED TO LOOK LIKE THEY'RE FROM AUTHENTIC COMPANIES. THEY'RE SENT BY CRIMINALS TO STEAL PERSONAL AND FINANCIAL INFORMATION FROM YOU. THIS IS ALSO KNOWN AS "SPOOFING
A) SPAM B) PHISHING C) HACKING
- 16. TRICK YOU INTO GIVING THEM INFORMATION BY ASKING YOU TO UPDATE, VALIDATE OR CONFIRM YOUR ACCOUNT. IT IS OFTEN PRESENTED IN A MANNER THAN SEEMS
OFFICIAL AND INTIMIDATING, TO ENCOURAGE YOU TO TAKE ACTION
A) SPAM B) PHISHING C) MALWARE
- 17. A TYPE OF MALWARE THAT RESTRICTS ACCESS TO YOUR COMPUTER OR YOUR FILES AND DISPLAYS A MESSAGE THAT DEMANDS PAYMENT IN ORDER FOR THE RESTRICTION TO BE REMOVED
A) RANSOMWARE B) MALWARE C) HACKING
- 18. THE TWO MOST COMMON MEANS OF INFECTION APPEAR TO BE PHISHING EMAILS THAT CONTAIN MALICIOUS ATTACHMENTS AND WEBSITE POP-UP ADVERTISEMENTS
A) MALFUNCTION B) MALWARE C) RANSOMWARE
- 19. WILL DISPLAY A NOTIFICATION STATING THAT YOUR COMPUTER OR DATA HAVE BEEN LOCKED AND DEMANDING A PAYMENT BE MADE FOR YOU TO REGAIN ACCESS SOMETIMES THE NOTIFICATION STATES THAT AUTHORITIES HAVE DETECTED ILLEGAL ACTIVITY ON YOUR COMPUTER, AND THAT THE PAYMENT IS A FINE TO AVOID PROSECUTION
A) RANSOMWARE B) MALWARE C) SPAM
- 20. ARE A COMMON THREAT TO COMPUTERS AND THE INTERNET AS A WHOLE
A) MALWARE B) SPAM C) WORMS
- 21. A ______, UNLIKE A VIRUS, GOES TO WORK ON ITS OWN WITHOUT ATTACHING ITSELF TO FILES OR PROGRAMS
A) SPAM B) VIRUS C) WORM
- 22. ARE OFTEN USED BY THIRD PARTIES TO INFILTRATE YOUR COMPUTER
A) SPAM B) SPYWARE C) MALWARE
- 23. SOFTWARE THAT COLLECTS PERSONAL INFORMATION ABOUT YOU WITHOUT YOU KNOWING, THEY OFTEN COME IN THE FORM OF A 'FREE DOWNLOAD AND ARE INSTALLED AUTOMATICALLY WITH OR WITHOUT YOUR CONSENT. THESE ARE DIFFICULT TO REMOVE AND CAN INFECT YOUR COMPUTER WITH VIRUSES
A) SPAM B) SPYWARE C) MALWARE
- 24. TERM YOU'RE FAMILIAR WITH, BUT THERE'S A GOOD CHANCE YOU OR SOMEONE YOU KNOW HAS BEEN AFFECTED BY ONE
A) MALWARE B) HACKING C) TROJAN HORSE
- 25. A MALICIOUS PROGRAM THAT IS DISGUISED AS, OR EMBEDDED WITHIN, LEGITIMATE SOFTWARE IT IS AN EXECUTABLE FILE THAT WILL INSTALL ITSELF AND RUN AUTOMATICALLY ONCE IT'S DOWNLOADED
A) TROJAN HORSE B) SPAM C) HACKING D) MALWARE
- 26. MOST PEOPLE HAVE HEARD OF COMPUTER VIRUSES, BUT NOT MANY KNOW EXACTLY WHAT THEY ARE OR WHAT THEY DO.
A) VIRUS B) SPAM C) SNAKE
- 27. MALICIOUS COMPUTER PROGRAMS THAT ARE OFTEN SENT AS AN EMAIL ATTACHMENT OR A DOWNLOAD WITH THE INTENT OF INFECTING YOUR COMPUTER, AS WELL AS THE COMPUTERS OF EVERYONE IN YOUR CONTACT LIST. JUST VISITING A SITE CAN START AN AUTOMATIC DOWNLOAD OF A VIRUS.
A) HACKING B) VIRUSES C) SPAM.
A) MALWARE B) VIRUS C) WORMS
- 29. HLIACK YOUR WEB BROWSER
A) WORMS B) HACKING C) VIRUSES
A) VIRUSES B) HACKING C) WORMS
|