IT lesson 3 Flashcards

1
Q

is a term used to describe actions taken by someone to gain unauthorized access to a computer.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is one of the more common ways to infiltrate or damage your computer. Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used most often by cyber criminals because it’s easy to execute and can produce the results they’re looking for with very little effort. Fake emails, text messages and websites created to look like they’re from authentic companies.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

e is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is one of the more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

often used by third parties to infiltrate your computer. What it is: Software that collects personal information about you without you knowing. They often come in the form of a ‘free’ download and are installed automatically with or without your consent.

A

Spyware (Spyware & Adware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

may not be a term you’re familiar with, but there’s a good chance you or someone you know has been affected by one. A malicious program that is disguised as, or embedded within, legitimate software

A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of a virus.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is another method used by cyber criminals to capture personal
information. Virtual “listening in” on information that’s shared over an unsecure (not encrypted) WiFi network.

A

Wi-Fi Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

common threat to computers and the Internet as a whole. A worm, unlike a virus, goes to work on its own without attaching itself to files or programs

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly