EMPTECH π€ (quiz 2) Flashcards
1
Q
- is a powerful tool.
- used to promote your business, gain new friends, and stay in touch with the old ones.
- a source of entertainment.
A
Internet
2
Q
Anyone has access to this highway, can place information, and can grab that information. Any information, even things that you have set privately, can be accessed one way or another.
A
Information Superhighway
3
Q
- A type of crime involving a computer or a computer network.
- The computer may have been used in committing the crime, or it may be the target.
- may harm someoneβs security or finances.
A
Cybercrime
4
Q
What are the Internet Threats?
A
- Malware
- Spam
- Phishing
5
Q
- stands for malicious software
A
Malware
6
Q
- a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.
- transfers from one computer to another by any type of means.
A
Virus
7
Q
- a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information
A
Trojan
8
Q
- tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.
A
Rogue security software
9
Q
- a program that runs in the background without you knowing it (thus called βspyβ).
- It has the ability to monitor what you are currently doing and typing through keylogging.
A
Spyware
10
Q
- used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
A
Keyloggers
11
Q
- used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
A
Keyloggers
12
Q
- unwanted email mostly from bots or advertisers. It can be used to send malware,
A
Spam
13
Q
- Its goal is to acquire sensitive personal information like passwords and credit card details.
- This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.
A
Phishing
14
Q
Types of phishing: ?
A
- Email Phishing
- Spear phishing
- Smishing
- Vishing
15
Q
- The most common form, where attackers send emails that appear to be from legitimate sources, urging recipients to click on a link or download an attachment.
A
Email Phishing
16
Q
- attackers customize their messages to a specific individual or organization, using personal information to make the message more convincing.
A
Spear Phishing
17
Q
- Phishing attempts sent via SMS (text messages), often containing links to malicious websites or prompting users to call a fake phone number.
A
Smishing
18
Q
- where attackers impersonate legitimate entities and attempt to extract personal information.
A
Vishing