1) Software that replicates and infects many computers, turning the computer into a “zombie”. Zombie devices are remotely controlled by an attacker for malicious purposes. a) Botnet  b) Keylogger  c) Man In The Middle d) Ransomware e) Rootkit f) Programming Errors 2) Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information. a) Keylogger  b) Man In The Middle c) Botnet d) Ransomware e) Rootkit f) Programming Errors 3) A human-based attack in which the malicious user intercepts communication between the victim’s computer and the internet. a) Man In The Middle  b) Botnet c) Keylogger d) Ransomware e) Programming Errors f) Rootkit 4) Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it. Ransomware can spread like a virus, worm, or Trojan horse. a) Ransomware  b) Rootkit c) Programming Errors d) Botnet e) Keylogger f) Man In The Middle 5) Software running with elevated privileges to control a computer or to gain access to restricted accounts and data. a) Rootkit  b) Ransomware c) Programming Errors d) Botnet e) Keylogger f) Man In The Middle 6) Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running. a) Programming Errors  b) Ransomware c) Rootkit d) Botnet e) Keylogger f) Man In The Middle

Leaderboard

Visual style

Options

Switch template

Continue editing: ?