1) a type of computer program that, when executed, replicates itself by modifying other computer programs a) trojan horse b) Spyware c) Virus d) keylogger 2) Code designed to track your usage on the internet and to deliver that information to outside marketing computers and advertise services to you. a) trojan horse b) Spyware c) Virus d) keylogger 3) hidden code inserted in your site or files that give cybercriminals remote access to your site a) keylogger b) Backdoors c) Redirects d) Spyware 4) Scans files to look for malicious code a) firewall b) virus checker c) administrator d) MAC address filtering 5) Each hardware device has unique hardware address. A database of allowed hardware/MAC addresses is kept/whitelist a) firewall b) virus checker c) administrator d) MAC address filtering 6) Users have to type in some distorted text // recognise images for a set of images a) CAPTCHA b) Access rights c) administrator d) firewall 7) Users are associated with certain privileges a) CAPTCHA b) Access rights c) administrator d) keylogger 8) Analyses/scans network traffic a) administrator b) CAPTCHA c) firewall d) virus checker

Leaderboard

Visual style

Options

Switch template

Continue editing: ?