1. What includes programs specifically intended to penetrate or damage a computer system? Malware 2. What is extremely easy to breach? An unsecured computer 3. What malware’s name originates from Greek mythology? Trojan Horse 4. What is a program that records every keystroke made on a computer? Keylogging 5. What is the abuse of an email system called? Spamming 6. Which Internet fraud involves using social engineering techniques? Phishing 7. What is it called when someone wrongfully uses another person’s information? Identity theft 8. What is the most uncomplicated Internet fraud? Purchase scam 9. What means that one’s personal identity is not known? Anonymous 10. What is it called when someone glances at your computer to glean information? Shoulder surfing
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |