Understanding Networking Nasties Quiz
20 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of malware can block access to your files until a ransom is paid?

  • Adware
  • Spyware
  • Virus
  • Ransomware (correct)

Which type of malware spreads through networks and emails, infecting as many computers as possible?

  • Adware
  • Spyware
  • Botnet
  • Worm (correct)

What type of malware replicates itself between files on a computer, ruining them or the entire computer?

  • Virus (correct)
  • Keylogger
  • Botnet
  • Worm

Which type of malware displays ads on a computer and may slow down its performance?

<p>Adware (D)</p> Signup and view all the answers

What type of malware keeps track of every key typed and sends it to the hacker?

<p>Keylogger (D)</p> Signup and view all the answers

What type of attack involves someone getting your personal information and engaging in illegal activities posing as you?

<p>Identity theft (C)</p> Signup and view all the answers

Which action can help protect your computer from potential threats?

<p>Running antivirus regularly and automatically (C)</p> Signup and view all the answers

What is the main reason for avoiding financial transactions on a public WiFi network?

<p>To avoid packet sniffing attacks (C)</p> Signup and view all the answers

What is the primary objective of phishing?

<p>To trick individuals into revealing passwords or financial information (B)</p> Signup and view all the answers

How can you enhance your computer's security in terms of passwords?

<p>Having strong passwords and changing them for different sites (A)</p> Signup and view all the answers

What type of malware prevents people from using a server or a website by overwhelming it with traffic?

<p>DDoS Attack (C)</p> Signup and view all the answers

Which type of malware replicates itself between files on a computer, ruining them or the entire computer?

<p>Virus (C)</p> Signup and view all the answers

What is the primary purpose of a keylogger?

<p>To keep track of every key typed and send it to the hacker (A)</p> Signup and view all the answers

Which type of malware spies on the user and steals information such as passwords or financial details?

<p>Spyware (C)</p> Signup and view all the answers

What action can lead to the installation of adware on your computer?

<p>Clicking on an ad online (B)</p> Signup and view all the answers

Which action is NOT recommended for protecting your computer from potential threats?

<p>Open suspicious emails or email attachments (C)</p> Signup and view all the answers

What is the main difference between packet sniffing and phishing?

<p>Packet sniffing involves stealing passwords, while phishing tricks you into revealing your passwords (D)</p> Signup and view all the answers

What is the most effective way to protect your computer from packet sniffing and phishing on public WiFi?

<p>Using a VPN (Virtual Private Network) (B)</p> Signup and view all the answers

What is the potential risk of doing secure actions (e.g., banking) on public WiFi or networks?

<p>Having your passwords stolen through packet sniffing (B)</p> Signup and view all the answers

How can one identify phishing attempts in emails or through phone calls?

<p>By ignoring any emails that ask for credit card or bank numbers (A)</p> Signup and view all the answers

More Like This

Networking Concepts Quiz
67 questions

Networking Concepts Quiz

BrainiestDouglasFir avatar
BrainiestDouglasFir
Networking Protocols and Concepts Quiz
65 questions
Networking Protocols and IP Addressing Quiz
30 questions
Networking - IP Addressing Flashcards
17 questions
Use Quizgecko on...
Browser
Browser