1) 1. What is the umbrella term for all types of harmful software? a) a) Spyware b) b) Malware c) c) Ransomware d) d) Adware 2) 2. What is "cryptojacking"? a) a) A technique to encrypt files for ransom b) b) Unauthorized use of a system to mine cryptocurrency c) c) An attack to steal personal information d) d) A malware that spreads through emails 3) 3. What is a recommended practice to prevent malware attacks? a) a) Use weak passwords b) b) Never update software c) c) Install antivirus software and scan for malware regularly d) d) Open all emails, even from unknown sources 4) 4. What does a Trojan Horse malware do? a) a) Deletes important files b) b) Disguises itself as legitimate software to gain unauthorized access c) c) Sends spam emails d) d) Encrypts user files 5) 5. What is a rootkit? a) a) A type of antivirus software b) b) A tool that encrypts files c) c) Malware that hides its presence and grants privileged access d) d) A method of hacking into emails 6) 6. What does a Distributed Denial of Service (DDoS) attack do? a) a) Encrypts files to hold them hostage b) b) Floods a system with traffic to make it unavailable c) c) Steals passwords d) d) Tracks user behavior 7) 7. What should you avoid doing to prevent falling victim to phishing? a) a) Regularly scanning for viruses b) b) Clicking on suspicious links or downloading attachments from unknown sources c) c) Using complex passwords d) d) Updating software 8) 8. What is the purpose of spyware? a) a) Steal money b) b) Collect user data and monitor activities without the user's knowledge c) c) Display unwanted ads d) d) Install ransomware 9) 9. What should organizations regularly perform to identify and mitigate vulnerabilities in their systems? a) a) Incident response plans b) b) Data encryption c) c) Regular audits and monitoring d) d) User awareness training 10) 10. What is "scareware"? a) a) A type of malware that uses fear tactics to trick users into installing malicious software b) b) A legitimate tool used by cybersecurity experts to protect systems c) c) Software that creates fake alerts about system problems to scare users into paying for fake solutions d) d) A virus that spreads through email attachments

Leaderboard

Visual style

Options

Switch template

Continue editing: ?