Hackers and Malware Quiz
10 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Hacker is just a clever programmer who uses their computer skills to gain unauthorised access to other person's confidential data such as credit card number, password, or personal information. Malware is short form of __________ software.

malicious

Hackers use malware to steal personal information or passwords, corrupt data, or take over a system. Two common types of malware include computer __________.

viruses

Computer viruses are usually attached to executable files (exe) and macro scripts in documents and spreadsheets. Once users run the infected program, the virus will damage the data and gain control of the computer. A virus can spread across computers through networks by making copies of itself. Viruses are usually hidden in commonly used programs, such as email attachments or files you downloaded from the ________.

internet

Trojan horse is a malware that disguises itself as a useful application. When a user runs a trojan horse, it allows hackers to infiltrate your computer system, remotely controlling your device and steal your information including browsing habit or history, HKID card number, mobile numbers, and ________.

<p>password</p> Signup and view all the answers

Unlike computer viruses, trojan horse doesn't ________ themselves.

<p>replicate</p> Signup and view all the answers

Protection against malware includes installing antivirus software and keeping the virus signature most updated. Antivirus software keeps our computers safe by scanning our files and isolating those ________.

<p>infected</p> Signup and view all the answers

A hacker is a clever programmer who uses their computer skills to gain unauthorized access to other person's confidential data such as credit card numbers, passwords, or personal information. Malware is a short form of malicious ________.

<p>software</p> Signup and view all the answers

Hackers use malware to steal personal information or passwords, corrupt data, or take over a system. Two common types of malware include computer ________.

<p>viruses</p> Signup and view all the answers

Computer viruses are usually attached to executable files (exe) and macro scripts in documents and spreadsheets. Once users run the infected program, the virus will damage the data and gain control of the computer. A virus can spread across computers through networks by making copies of itself. Viruses are usually hidden in commonly used programs, such as email attachments or files you downloaded from the ________.

<p>internet</p> Signup and view all the answers

Trojan horse is a malware that disguises itself as a useful application. When a user runs a trojan horse, it allows hackers to infiltrate your computer system, remotely controlling your device and steal your information including browsing habits or history, HKID card number, mobile numbers, and ________.

<p>password</p> Signup and view all the answers

More Like This

Certified Ethical Hacker Quiz
10 questions
Cybersecurity: Gray Hat Hackers and Malware
10 questions
Gray Hat Hackers and Malware
16 questions

Gray Hat Hackers and Malware

GutsyAquamarine3939 avatar
GutsyAquamarine3939
Malware and Hacker Overview
20 questions
Use Quizgecko on...
Browser
Browser