17 Questions
What is the primary goal of social engineering attacks?
To manipulate someone into giving out confidential information
What is the term for the forgery of an email header to make it appear as if it came from a different origin or person?
Spoofing
What type of malware is designed to monitor and track a user's computer activities, including keystrokes and screenshots?
Keylogger
What is the term for the scamming practice where a user is redirected to a fake website, even when they enter a valid URL?
Pharming
What is the term for the attack where a website appears to be one thing, but the user's clicks are redirected to do something else?
Click-jacking
What is the general term for software that is written with negative intentions, including viruses, spyware, and other types of malicious code?
Malware
What is the primary difference between a computer worm and a Trojan?
A computer worm is a type of malware that can distribute itself, while a Trojan is a type of malware that requires activation
What is the term for a computer that has been compromised and can be controlled remotely?
Bot
What does ransomware do to the data on a computer?
Encrypts it
What is the primary function of anti-virus software?
To scan files for malware and eliminate it
What is the name of the type of malware that downloads onto a computer and displays unwanted advertisements?
Adware
What precaution should be taken when installing 'free' software?
Be careful
What should you do when you encounter a pop-up while browsing the internet?
Close it immediately
What is a potential risk of using public computers for financial transactions?
Your personal information may be compromised
What happens to the data you post on social media sites like Facebook?
The site owns everything you post
What is the main idea behind the 'Paranoid ABC' approach to online security?
To be cautious and verify everything
Why should you be cautious when using free online services?
They may use your data for advertising
Test your knowledge on the dangers of computer crime, including social engineering, malware, and phishing techniques. Learn how to identify and protect yourself from these cyber threats.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free