18 Questions
What is the primary purpose of spyware software?
To monitor and record personal details
What type of software is used to monitor online shopping habits?
Adware software
What is the term for software that takes control of the browser and shows unsolicited advertisements?
Browser hijacking software
Why do many websites require users to select characters or photos that are randomly generated and displayed on screen?
To ensure network security
What is the potential consequence of spyware gathering personal information?
Fraud or blackmail
What type of software is used to secretly monitor the user's actions on the computer and send them over the internet?
Spyware software
What is the primary intent of an individual committing data theft in a business setting?
To profit from the stolen data
What is the term used to describe the act of making sensitive information available to others for moral or ethical reasons?
Whistleblowing
What is the result of a deliberate attack on a web server, causing it to be unable to service clients' requests?
Denial of service (DoS)
What is the purpose of a firewall in a business network?
To prevent outsiders from gaining access to sensitive data
What is the term used to describe impersonating someone, making threats, and in some cases, progressing to physical stalking in the real world?
Cyberstalking
What is the term used to describe a website that specialises in sharing stolen data for moral or ethical reasons?
WikiLeaks
What is the primary goal of phishing attacks?
To persuade individuals to disclose private information
What is a characteristic of a worm?
It is a stand-alone program that spreads via network connections
What is the purpose of a key logger?
To record every keystroke and send it secretly across the internet
What is the term for malicious software that includes viruses, Trojan horses, and spyware?
Malware
How do phishing attacks often appear convincing?
By including a working phone number and company logo
What is the result of a worm infecting a computer system?
The system slows down due to hijacked processing power
This quiz covers different types of cyber threats, including impersonation, making threats, and physical stalking, as well as data theft and security precautions to protect sensitive information.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free