Cybersecurity Threats and Data Theft

DelicateForest avatar
DelicateForest
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What is the primary purpose of spyware software?

To monitor and record personal details

What type of software is used to monitor online shopping habits?

Adware software

What is the term for software that takes control of the browser and shows unsolicited advertisements?

Browser hijacking software

Why do many websites require users to select characters or photos that are randomly generated and displayed on screen?

To ensure network security

What is the potential consequence of spyware gathering personal information?

Fraud or blackmail

What type of software is used to secretly monitor the user's actions on the computer and send them over the internet?

Spyware software

What is the primary intent of an individual committing data theft in a business setting?

To profit from the stolen data

What is the term used to describe the act of making sensitive information available to others for moral or ethical reasons?

Whistleblowing

What is the result of a deliberate attack on a web server, causing it to be unable to service clients' requests?

Denial of service (DoS)

What is the purpose of a firewall in a business network?

To prevent outsiders from gaining access to sensitive data

What is the term used to describe impersonating someone, making threats, and in some cases, progressing to physical stalking in the real world?

Cyberstalking

What is the term used to describe a website that specialises in sharing stolen data for moral or ethical reasons?

WikiLeaks

What is the primary goal of phishing attacks?

To persuade individuals to disclose private information

What is a characteristic of a worm?

It is a stand-alone program that spreads via network connections

What is the purpose of a key logger?

To record every keystroke and send it secretly across the internet

What is the term for malicious software that includes viruses, Trojan horses, and spyware?

Malware

How do phishing attacks often appear convincing?

By including a working phone number and company logo

What is the result of a worm infecting a computer system?

The system slows down due to hijacked processing power

This quiz covers different types of cyber threats, including impersonation, making threats, and physical stalking, as well as data theft and security precautions to protect sensitive information.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser