1) Blagging a) manipulating people into handing over confidential information such as a password b) internet slang for a person who intentionally tries to instigate arguments online c) when someone makes up a story to gain someone's interest to encourage them to give away information about themselves, or even send money 2) Dictionary Attack a) an attempt to gain access to a computer system by using a very large set of words to generate potential passwords b) a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer c) Malicious software that encrypts programs and data until a ransom is paid to remove it. 3) Netiquette a) manipulating people into handing over confidential information such as a PIN or password. Phishing and Blagging are examples of social engineering. b) internet slang for a person who intentionally tries to instigate arguments online c) is the etiquette of the Internet, simple rules for how you should act in Cyberspace that keep things polite 4) Phishing a) is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. b) internet slang for a person who intentionally tries to instigate conflict or arguments online c) is the etiquette of the Internet, simple rules for how you should act in Cyberspace that keep things polite d) an attack designed to steal a victim's password or sensitive data. It involves the attacker watching the victim while they provide information 5) Shouldering a) an attack designed to steal a victim's password or other sensitive data. It involves the attacker watching the victim while they provide sensitive information b) manipulating people into handing over confidential information c) is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. 6) Social Engineering a) internet slang for a person who intentionally tries to instigate conflict or arguments online b) is the etiquette of the Internet c) Software that automatically displays or downloads advertising material d) manipulating people into handing over confidential information such as a PIN or password. Phishing and Blagging are examples of social engineering. 7) Trolling a) internet slang for a person who intentionally tries to instigate conflict or arguments online b) is the etiquette of the Internet, simple rules for how you should act in Cyberspace that keep things polite c) manipulating people into handing over confidential information 8) Computer Virus a) a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer b) Malicious software that encrypts programs and data until a ransom is paid to remove it. c) A type of Malware that locates and saves data from users without them knowing about it. d) Software that automatically displays or downloads advertising material (often unwanted) when a user is online. 9) Computer Worm a) Software that automatically displays or downloads advertising material b) A type of Malware that locates and saves data from users without them knowing about it. c) Malicious software that encrypts programs and data until a ransom is paid d) A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers. 10) Adware a) Software that automatically displays or downloads advertising material (often unwanted) when a user is online. b) internet slang for a person who intentionally tries to instigate conflict or arguments online c) a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer 11) Spyware a) an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. b) A type of Malware that locates and saves data from users without them knowing about it. c) a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer 12) Ransomware a) Malicious software that encrypts programs and data until a ransom is paid to remove it. b) an attempt to gain access to a computer system by using a very large set of words to generate potential passwords c) Software that automatically displays or downloads advertising material (often unwanted) when a user is online.

Leaderboard

Visual style

Options

Switch template

Continue editing: ?