What kind of malware encrypts the user's data and keeps the user from accessing it unless they pay the criminals? , , , , What kind of spyware monitors and records every key that is typed on a computer's keyboard, , , , What kind of software allows a criminal to remotely access or control a computer without being detected by the user?, , , , What kind of malware disguises itself as a normal file to trick users into downloading it?, , , , What kind of malware attaches itself to a host file, copies itself, and spreads to other computers?, , , , What kind of malware consumes bandwidth, overloads web servers, and is often spread by sending mass emails with infected attachments to users' contacts?, , , , What word describes the sending of mass unsolicited messages via email?, , , , What is the name of the tool that is used to decrypt coded messages?, , , , What is the most commonly used password?, , , , What kind of cyber attack tries to overwhelm a computer system so that it cannot respond to service requests?, , , , What kind of cyber attack occurs when an attacker intercepts or changes a message between two computers? , , , , What kind of cyber attack occurs when an attacker intercepts or changes a message between two computers? , , , .

Classifica

Stile di visualizzazione

Opzioni

Cambia modello

)
Ripristinare il titolo salvato automaticamente: ?