Podcast
Questions and Answers
What is the primary purpose of spyware software?
What is the primary purpose of spyware software?
What type of software is used to monitor online shopping habits?
What type of software is used to monitor online shopping habits?
What is the term for software that takes control of the browser and shows unsolicited advertisements?
What is the term for software that takes control of the browser and shows unsolicited advertisements?
Why do many websites require users to select characters or photos that are randomly generated and displayed on screen?
Why do many websites require users to select characters or photos that are randomly generated and displayed on screen?
Signup and view all the answers
What is the potential consequence of spyware gathering personal information?
What is the potential consequence of spyware gathering personal information?
Signup and view all the answers
What type of software is used to secretly monitor the user's actions on the computer and send them over the internet?
What type of software is used to secretly monitor the user's actions on the computer and send them over the internet?
Signup and view all the answers
What is the primary intent of an individual committing data theft in a business setting?
What is the primary intent of an individual committing data theft in a business setting?
Signup and view all the answers
What is the term used to describe the act of making sensitive information available to others for moral or ethical reasons?
What is the term used to describe the act of making sensitive information available to others for moral or ethical reasons?
Signup and view all the answers
What is the result of a deliberate attack on a web server, causing it to be unable to service clients' requests?
What is the result of a deliberate attack on a web server, causing it to be unable to service clients' requests?
Signup and view all the answers
What is the purpose of a firewall in a business network?
What is the purpose of a firewall in a business network?
Signup and view all the answers
What is the term used to describe impersonating someone, making threats, and in some cases, progressing to physical stalking in the real world?
What is the term used to describe impersonating someone, making threats, and in some cases, progressing to physical stalking in the real world?
Signup and view all the answers
What is the term used to describe a website that specialises in sharing stolen data for moral or ethical reasons?
What is the term used to describe a website that specialises in sharing stolen data for moral or ethical reasons?
Signup and view all the answers
What is the primary goal of phishing attacks?
What is the primary goal of phishing attacks?
Signup and view all the answers
What is a characteristic of a worm?
What is a characteristic of a worm?
Signup and view all the answers
What is the purpose of a key logger?
What is the purpose of a key logger?
Signup and view all the answers
What is the term for malicious software that includes viruses, Trojan horses, and spyware?
What is the term for malicious software that includes viruses, Trojan horses, and spyware?
Signup and view all the answers
How do phishing attacks often appear convincing?
How do phishing attacks often appear convincing?
Signup and view all the answers
What is the result of a worm infecting a computer system?
What is the result of a worm infecting a computer system?
Signup and view all the answers