Cybersecurity Threats and Data Theft
18 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of spyware software?

  • To provide targeted marketing
  • To create digital forgery
  • To protect against DDoS attacks
  • To monitor and record personal details (correct)
  • What type of software is used to monitor online shopping habits?

  • Adware software (correct)
  • Browser hijacking software
  • Malware software
  • Key logger software
  • What is the term for software that takes control of the browser and shows unsolicited advertisements?

  • Spyware
  • Malware
  • Adware
  • Browser hijacking software (correct)
  • Why do many websites require users to select characters or photos that are randomly generated and displayed on screen?

    <p>To ensure network security (A)</p> Signup and view all the answers

    What is the potential consequence of spyware gathering personal information?

    <p>Fraud or blackmail (A)</p> Signup and view all the answers

    What type of software is used to secretly monitor the user's actions on the computer and send them over the internet?

    <p>Spyware software (C)</p> Signup and view all the answers

    What is the primary intent of an individual committing data theft in a business setting?

    <p>To profit from the stolen data (D)</p> Signup and view all the answers

    What is the term used to describe the act of making sensitive information available to others for moral or ethical reasons?

    <p>Whistleblowing (A)</p> Signup and view all the answers

    What is the result of a deliberate attack on a web server, causing it to be unable to service clients' requests?

    <p>Denial of service (DoS) (A)</p> Signup and view all the answers

    What is the purpose of a firewall in a business network?

    <p>To prevent outsiders from gaining access to sensitive data (B)</p> Signup and view all the answers

    What is the term used to describe impersonating someone, making threats, and in some cases, progressing to physical stalking in the real world?

    <p>Cyberstalking (A)</p> Signup and view all the answers

    What is the term used to describe a website that specialises in sharing stolen data for moral or ethical reasons?

    <p>WikiLeaks (C)</p> Signup and view all the answers

    What is the primary goal of phishing attacks?

    <p>To persuade individuals to disclose private information (A)</p> Signup and view all the answers

    What is a characteristic of a worm?

    <p>It is a stand-alone program that spreads via network connections (B)</p> Signup and view all the answers

    What is the purpose of a key logger?

    <p>To record every keystroke and send it secretly across the internet (A)</p> Signup and view all the answers

    What is the term for malicious software that includes viruses, Trojan horses, and spyware?

    <p>Malware (B)</p> Signup and view all the answers

    How do phishing attacks often appear convincing?

    <p>By including a working phone number and company logo (B)</p> Signup and view all the answers

    What is the result of a worm infecting a computer system?

    <p>The system slows down due to hijacked processing power (B)</p> Signup and view all the answers

    More Like This

    Cybersecurity Basics
    7 questions

    Cybersecurity Basics

    SubstantivePedalSteelGuitar avatar
    SubstantivePedalSteelGuitar
    Malware e Sicurezza Informatica
    48 questions

    Malware e Sicurezza Informatica

    WellBredMagicRealism5690 avatar
    WellBredMagicRealism5690
    Use Quizgecko on...
    Browser
    Browser