1) A law intended to prosecute unauthorised access with intent to commit or facilitate a crime. a) Trojan Horse b) Computer Misuse Act c) Eavesdropping d) Spam 2) A type of malicious code or program designed to spread from one computer to another by copying itself. a) Trojan Horse b) Phishing c) Hacking d) Computer Virus 3) To illegally access other people's computer systems in order to destroy, disrupt or carry out something illegal. a) Hacking b) Keylogger c) Denial of service d) Computer Virus 4) Encouraging a user to click on a email or text link to a fake website which looks identical to a legitimate company such as a bank, in order to steal valuable information. a) Pharming b) Computer Misuse Act c) Computer Virus d) Phishing 5) An attack which redirects an internet user to a bogus website in order to steal valuable information. a) Trojan Horse b) Ransomware c) Pharming d) Malware 6) Any kind of unwanted, unsolicited digital communication that gets sent out in bulk. It is often sent via email, but can also be distributed via text messages, phone calls, or social media. a) Keylogger b) Spam c) SQL injection attack d) Ransomware 7) A self-replicating program designed to cause disruption whilst spreading across a network. a) Keylogger b) Malware c) Spam d) Worm 8) A type of malware that downloads onto a computer disguised as a legitimate program. a) Hacking b) Trojan Horse c) Back door d) Keylogger 9) A type of malicious software designed to block access to a computer system until a sum of money is paid. a) Keylogger b) Spam c) Back door d) Ransomware 10) Software that enables a user to obtain information about the victims computer activities by transmitting data covertly from their hard drive. a) Trojan Horse b) Spyware c) Computer Virus d) Computer Misuse Act 11) A computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information. a) Trojan Horse b) Back door c) Ransomware d) Keylogger 12) A code insertion technique, used to attack data-driven applications. a) Trojan Horse b) SQL injection attack c) Phishing d) Spyware 13) A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. a) Computer Misuse Act b) Keylogger c) Denial of service d) Pharming 14) Software intentionally designed to cause damage to a computer, server, client, or computer network. a) Malware b) Denial of service c) Spyware d) Phishing 15) A method, often secret, of bypassing normal authentication or encryption in a computer system. a) Back door b) Phishing c) Trojan Horse d) Malware 16) An attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information. a) Denial of service b) SQL injection attack c) Eavesdropping d) Keylogger 17) Malware that causes unwanted pop-up adverts to appear on your computer or mobile. a) Spyware b) Ransomware c) Keylogger d) Adware 18) A form of identity theft where fake messages use the identity of a real user or business to extort money or obtain personal information. a) Email Spoofing b) Spam c) Phishing d) Eavesdropping 19) AI technology used to impersonate people, in order to demand money or information. a) Back Door b) Voice cloning c) Adware d) Keylogger 20) A type of scam that targets a specific person or group and often will include information known to be of interest to the target, such as financial documents a) Trojan horse b) Malware c) Spear Phishing d) Spam
0%
Computer Hacks & Attacks Level 4
공유
공유
공유
만든이
Shickey5
Primary
Computing
Online Safety
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?