1.
____________ a malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
Explanation
Malware refers to a range of malicious software that can infect computers, including viruses, worms, Trojan horses, spyware, and adware. These programs are designed to harm or exploit computer systems, steal sensitive information, or disrupt normal operations. They can be spread through various means, such as email attachments, infected websites, or removable media. Malware can cause significant damage to a computer system, compromising its security and performance. It is important to have effective antivirus and security measures in place to protect against malware threats.
2.
A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
Correct Answer
B. Pharming
Explanation
Pharming is the correct answer because it involves redirecting users to a malicious and fake website, even if they enter the correct URL. This technique is often used by cybercriminals to deceive users and steal their personal information, such as login credentials or financial details. Unlike phishing, which relies on tricking users into clicking on a fraudulent link, pharming directly manipulates the DNS (Domain Name System) to redirect legitimate traffic to a fake website. This makes it harder for users to detect the scam, as they are not redirected through a suspicious link.
3.
A website or email address that is created to look like it comes from a legitimate source. An email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real.
Correct Answer
B. Spoofing
Explanation
Spoofing refers to the act of creating a website or email address that appears to be from a trustworthy source, but is actually fake. The sender may use familiar names or addresses to deceive the recipient into thinking that the communication is legitimate. This can make it challenging for the recipient to determine whether the sender is genuine or not.
4.
Worm is an executable file that will install itself and run automatically once it's downloaded.
Correct Answer
B. False
Explanation
Trojan Horse
5.
________ can record instant messages, email, and capture any information you type at any time using your keyboard, including usernames, passwords, and other personally identifiable information(PII).
Correct Answer
Keylogger
Explanation
A keylogger is a type of software or hardware device that can record and monitor keystrokes made on a computer or mobile device. It can capture all typed information, including instant messages, emails, usernames, passwords, and other personally identifiable information (PII). This allows unauthorized individuals to gain access to sensitive data without the user's knowledge or consent.
6.
Virtual “listening in” on information that's shared over an insecure (not encrypted) WiFi network.
Correct Answer
C. Wi-Fi Eavesdropping
Explanation
Wi-Fi eavesdropping refers to the act of intercepting and listening to information being transmitted over a Wi-Fi network without authorization. This can occur when the network is not encrypted, making it vulnerable to unauthorized access. Eavesdroppers can capture and potentially exploit sensitive information shared over the network, such as passwords, financial data, or personal communications. Therefore, Wi-Fi eavesdropping is a significant security concern, highlighting the importance of using encryption protocols like WPA2 to protect wireless networks from such attacks.
7.
Spyware is software that is installed on a computing device with the end user's knowledge.
Correct Answer
B. False
Explanation
without the end users kwonloegde
8.
________ is a collection of internet-connected devices, which may include PCs, servers, mobile devices, and the internet of things devices that are infected and controlled by a common type of malware.
Correct Answer
Botnet
Explanation
A botnet is a network of compromised devices, such as computers, servers, and mobile devices, that have been infected with malware and are under the control of a single entity. These infected devices, also known as bots, can be used by cybercriminals to carry out various malicious activities, such as launching distributed denial-of-service (DDoS) attacks, sending spam emails, stealing sensitive information, or spreading more malware. The common characteristic of a botnet is that it is a collection of internet-connected devices that have been hijacked by malware and are being controlled remotely by a malicious actor.
9.
________ is a cyber attack intended to redirect a website's traffic to another, fake site.
Correct Answer
Pharming
Explanation
Pharming is a type of cyber attack where hackers manipulate the DNS (Domain Name System) to redirect website traffic to a fake site. This fake site is designed to mimic the original website, tricking users into entering sensitive information such as login credentials or financial details. Unlike phishing, where users are lured to the fake site through deceptive emails or messages, pharming directly redirects users to the malicious site without their knowledge or consent. This attack can be carried out by exploiting vulnerabilities in DNS servers or by infecting users' computers with malware that alters their DNS settings.
10.
Hacking is the process by which cybercriminals gain access to your computer.
Correct Answer
A. True
Explanation
Hacking is indeed the process by which cybercriminals gain unauthorized access to a computer system. It involves exploiting vulnerabilities in the system's security measures to gain control or extract sensitive information. Hackers can use various techniques and tools to carry out their attacks, such as malware, phishing, or brute-force attacks. Therefore, the statement "Hacking is the process by which cybercriminals gain access to your computer" is true.