1) Which of the following is an example of a data threat? a) Malware b) Worms c) Spam d) Adware 2) What type of malicious software is designed to disrupt computer operations, gather sensitive information, or gain access to private computer systems? a) Ransomware b) Spyware c) Worms d) Trojan Horses 3) What type of malicious software is designed to encrypt data and demand payment for its release? a) Adware b) Spyware c) Ransomware d) Worms 4) What type of malicious software is designed to replicate itself and spread to other computers? a) Spyware b) Adware c) Ransomware d) Worms 5) What type of attack is designed to steal a person's identity? a) A. Phishing b) Spoofing c) Identity Theft d) Denial of Service 6) What type of attack is designed to gain unauthorised access to a computer system? a) Denial of Service b) Identity Theft c) Spoofing d) Phishing 7) What type of attack is designed to disguise the origin of malicious content? a) Denial of Service b) Spoofing c) Phishing d) Identity Theft 8) What type of attack is designed to flood a network with traffic, making it unavailable to other users? a) Spoofing b) Denial of Service c) Phishing d) Identity Theft 9) What type of malicious software is designed to display unwanted ads or redirect users to malicious websites? a) Worms b) Adware c) Ransomware d) Trojan Horses 10) What type of malicious software is designed to secretly monitor a user's activities? a) Worms b) Ransomware c) Spyware d) Adware

Leaderboard

Visual style

Options

Switch template

Continue editing: ?