1) An attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money. a) Trojans b) Brute Force c) Blagging d) Two-factor authentication 2) An attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data. a) Worms b) Phishing c) Blagging d) Firewalls 3) Gaining unauthorised access to or control of a computer system a) Phishing b) Adware c) Hacking d) CAPTCHA 4) Malicious software designed to gain access to your computer with malicious intent. a) Malware b) DDoS c) Firewalls d) Blagging 5) Malicious form of self-replicating software. a) Firewalls b) Anti-malware c) Viruses d) DDoS 6) Replicate themselves but do not attach themselves to files as a virus does. a) DDoS b) Viruses c) Worms d) Backups 7) Locks a computer, encrypts files, then demands payment to decrypt files a) Blagging b) Auto-updates c) Ransomware d) Firewalls 8) A piece of software that appears to perform a useful function but it also performs malicious actions. a) Trojans b) Ransomware c) Backups d) Blagging 9) Unwanted software that monitors and gathers information on a person and how they use their computer. a) Spyware b) DDoS c) Hacking d) Phishing 10) Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online a) DDoS b) Firewalls c) Malware d) Adware 11) Software that automatically checks for available updates for the software you have on your computer. a) Anti-malware b) Auto-updates c) Ransomware d) Spyware 12) Software that scans any file that is able to execute code. Will have a list of definitions of sequences of code that they are aware are malicious. a) Malware b) Adware c) Anti-malware d) Auto-updates 13) Checks incoming and outgoing network traffic. It scans the data to make sure it doesn’t contain anything malicious a) Phishing b) Backups c) Adware d) Firewalls 14) Multiple attempts are being made to log in to the account a) Adware b) Brute Force c) Trojans d) Auto-updates 15) A large collection of malware-infected devices (zombies) used to perform an attack a) DDoS b) Brute Force c) Two-factor authentication d) Viruses 16) Uses a second verification code such as a text message a) Two-factor authentication b) Firewalls c) Malware d) Adware 17) Please select all the pictures with Cats in a) Ransomware b) Trojans c) CAPTCHA d) Adware 18) Copies of data, kept in a safe place a) CAPTCHA b) Backups c) Worms d) Blagging

Leaderboard

Visual style

Options

Switch template

Continue editing: ?