0 of 10 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
“Software, which monitors the activities of a computer user and sends back as much information about them as possible (e.g: passwords, usernames, websites they visit, purchases they have made)”. Which threat is being described here?
“Using direct communications, such as emails and phone calls, whilst impersonating legitimate companies (such as banks), asking you to give away sensitive information”. Which threat is being described here?
“The process of using trial and error to hack an account by trying thousands of different possible passwords against a particular username”. Which threat is being described here?
“Trying to bring down a website by using up its web server’s resources, by overloading it with traffic”. Which threat is being described here?
“The art of ‘bolting on’ some ‘database query instructions’ to the end of a password, which will allow access the accounts of other users”. Which threat is being described here?
“Software, which in general will harm a computer and/or its user”. Which threat is being described here?
“Software, which is specifically designed to cause physical harm to a computer system”. Which threat is being described here?
What is the primary reason why criminals attempt to gain access to a network?
Which type of malware replicates itself to slow down a system rather than directly deleting files?
How does a Brute Force Attack attempt to hack an account?