Internet Security Fundamentals
12 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the term for when an unauthorized entity gains access to data for which the entity is not authorized?

  • Disruption
  • Intrusion
  • Unauthorized Disclosure (correct)
  • Deception

What is the term for when an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications?

  • Inference (correct)
  • Masquerade
  • Corruption
  • Exposure

What type of cyber crime involves acquiring sensitive personal information like passwords and credit card details?

  • Phishing (correct)
  • Pharming
  • Malware
  • Spamming

What is the term for when an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity?

<p>Masquerade (A)</p> Signup and view all the answers

What is the term for when an authorized entity receives false data and believes it to be true?

<p>Deception (D)</p> Signup and view all the answers

What is the term for a malicious program designed to replicate itself and transfer from one file folder to another?

<p>Worm (D)</p> Signup and view all the answers

What is the term for when an unauthorized entity gains access to sensitive data by circumventing a system's security protections?

<p>Intrusion (C)</p> Signup and view all the answers

What is the term for a malicious program designed to monitor a user's activities without their knowledge?

<p>Spyware (B)</p> Signup and view all the answers

What is the term for a crime committed or assisted through the use of the Internet?

<p>Cyber crime (D)</p> Signup and view all the answers

What is the term for when an unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations?

<p>Interception (D)</p> Signup and view all the answers

What is the term for a program designed to send unwanted advertisements, mostly in the form of pop-ups?

<p>Adware (C)</p> Signup and view all the answers

What is the term for a malicious program designed to disguise itself as a useful program, but leaves a computer unprotected and allows hackers to access sensitive information?

<p>Trojan (C)</p> Signup and view all the answers

More Like This

Privacy and Internet Security
5 questions
Internet Security Risks Assessment
10 questions

Internet Security Risks Assessment

EngagingWilliamsite1265 avatar
EngagingWilliamsite1265
Internet Security Components Quiz
10 questions
Use Quizgecko on...
Browser
Browser