internet threats Flashcards

1
Q

Stands for malicious
software

A
  1. MALWARE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. MALWARE

. – a malicious program
designed to replicate itself and
transfer from one computer to
another either through the
Internet and local networks or
data storage like flash drives and
CDs.

A

VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. MALWARE

B. – a malicious program that
transfers from one computer to
another by any type of means. Often,
it uses a computer network to spread
itself.

A

WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. MALWARE

. – a malicious program
that is disguised as a useful
program but once downloaded or
installed, leaves your PC
unprotected and allows hackers
to get your information.

A

TROJAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. MALWARE

C. TROJAN
* - tricks
the user into posing that it is a
security software. It asks the user to
pay to improve his/her security but
in reality, they are not protected at
all.

A

Rogue security software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. MALWARE

D. – a program that runs in
the background without you
knowing it (thus called “spy”). It
has the ability to monitor what
you are currently doing and
typing through keylogging.

A

SPYWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. MALWARE

D. SPYWARE

*- used to record the
keystroke done by the users. This is
done to steal their password or any other
sensitive information. It can record
email, messages, or any information you
type using your keyboard.

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. MALWARE

E. – a program
designed to send
you advertisements,
mostly as pop-ups.

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unwanted email
mostly from bots or
advertisers. It can be
used to send malware.

A

SPAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It goal is to acquire sensitive personal
information like passwords and credit
card details. This is done by sending
you an email that will direct the user to
visit a website and be asked to update
his/her username, password, credit
card, or personal information.

A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. PHISHING

– a more complicated
way of phishing where it
exploits the DNS (?)

A

Pharming

Domain
Name Service) system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly