Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Assessment: IDENTIFICATION: Read The Questions Carefully. Write Your Answer Before The Number

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Assessment

IDENTIFICATION: Read the questions carefully. Write your answer before the number.
Malicious
software 1. Malware is a short term used for _________.

Lock screen It displays an image that prevents you from accessing


ransomware 2. your computer.

Pharming
3. _______ is a common type of online fraud.

Network
Etiquette 4. Netiquette is a short term used for _______.

5. The mass distribution of unsolicited messages,


Spam advertising, or pornography to addresses which can
be easily found on the internet.

Spyware and 6. ______ and ______ are often used by third parties to
Adware infiltrate your computer.

Trojan horses 7. It is an executable file that will install itself and run
automatically once it is downloaded.

8. Malicious computer programs that are often sent as


Viruses an email attachment or a download with the intent of
infecting your computer.

9. It is one of the more common methods of both


Spam sending information out and collecting it from
unsuspecting people.

Netiquette 10. It is a set of rules for behaving properly online.

11. A type of malware that restricts access to your


Ransomware computer or your files and displays a message that
demands payment for the restriction to be removed.

Pharming 12. A means to point you to a malicious and illegitimate


website by redirecting the legitimate URL.

Worms 13. _______ are common threats to computers and the


internet as a whole.

Hacking 14. Action taken by someone to gain unauthorized


access to a computer.

15. It encrypts files on your system’s hard drive and


Encryption sometimes on shared network drives, USB drives,
ransomware and external hard drives and even some cloud
storage drives preventing you from opening them.

Spyware and 16. They often come in the form of a free download and
Adware are installed automatically with or without your
consent.

Trojan horses 17. A malicious program that is disguised as or


embedded within legitimate software.

Wifi 18. Virtual listening in on your information that is shared


eavesdropping over an unsecured or not encrypted network.

Netiquette 19. It is the proper way to communicate in an online


environment.

Spyware 20. Software that collects personal information about you


without you knowing.

x-x-x-x-x-x-x- Nothing Follows -x-x-x-x-x-x-x

You might also like