The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
____________ a malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
Explanation Malware refers to a range of malicious software that can infect computers, including viruses, worms, Trojan horses, spyware, and adware. These programs are designed to harm or exploit computer systems, steal sensitive information, or disrupt normal operations. They can be spread through various means, such as email attachments, infected websites, or removable media. Malware can cause significant damage to a computer system, compromising its security and performance. It is important to have effective antivirus and security measures in place to protect against malware threats.
Rate this question:
2.
A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
A.
Phishing
B.
Pharming
C.
Ransomware
D.
Phlanting
Correct Answer
B. pHarming
Explanation Pharming is the correct answer because it involves redirecting users to a malicious and fake website, even if they enter the correct URL. This technique is often used by cybercriminals to deceive users and steal their personal information, such as login credentials or financial details. Unlike phishing, which relies on tricking users into clicking on a fraudulent link, pharming directly manipulates the DNS (Domain Name System) to redirect legitimate traffic to a fake website. This makes it harder for users to detect the scam, as they are not redirected through a suspicious link.
Rate this question:
3.
A website or email address that is created to look like it comes from a legitimate source. An email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real.
A.
Spyware
B.
Spoofing
C.
Spam
D.
Wi-Fi Eavesdropping
Correct Answer
B. Spoofing
Explanation Spoofing refers to the act of creating a website or email address that appears to be from a trustworthy source, but is actually fake. The sender may use familiar names or addresses to deceive the recipient into thinking that the communication is legitimate. This can make it challenging for the recipient to determine whether the sender is genuine or not.
Rate this question:
4.
Worm is an executable file that will install itself and run automatically once it's downloaded.
A.
True
B.
False
Correct Answer
B. False
Explanation Trojan Horse
Rate this question:
5.
________ can record instant messages, email, and capture any information you type at any time using your keyboard, including usernames, passwords, and other personally identifiable information(PII).
Correct Answer Keylogger
Explanation A keylogger is a type of software or hardware device that can record and monitor keystrokes made on a computer or mobile device. It can capture all typed information, including instant messages, emails, usernames, passwords, and other personally identifiable information (PII). This allows unauthorized individuals to gain access to sensitive data without the user's knowledge or consent.
Rate this question:
6.
Virtual “listening in” on information that's shared over an insecure (not encrypted) WiFi network.
A.
WI-FI Master
B.
WPA2 Handshake Vulnerabilities
C.
Wi-Fi Eavesdropping
D.
Spyware
Correct Answer
C. Wi-Fi Eavesdropping
Explanation Wi-Fi eavesdropping refers to the act of intercepting and listening to information being transmitted over a Wi-Fi network without authorization. This can occur when the network is not encrypted, making it vulnerable to unauthorized access. Eavesdroppers can capture and potentially exploit sensitive information shared over the network, such as passwords, financial data, or personal communications. Therefore, Wi-Fi eavesdropping is a significant security concern, highlighting the importance of using encryption protocols like WPA2 to protect wireless networks from such attacks.
Rate this question:
7.
Spyware is software that is installed on a computing device with the end user's knowledge.
A.
True
B.
False
Correct Answer
B. False
Explanation without the end users kwonloegde
Rate this question:
8.
________ is a collection of internet-connected devices, which may include PCs, servers, mobile devices, and the internet of things devices that are infected and controlled by a common type of malware.
Correct Answer Botnet
Explanation A botnet is a network of compromised devices, such as computers, servers, and mobile devices, that have been infected with malware and are under the control of a single entity. These infected devices, also known as bots, can be used by cybercriminals to carry out various malicious activities, such as launching distributed denial-of-service (DDoS) attacks, sending spam emails, stealing sensitive information, or spreading more malware. The common characteristic of a botnet is that it is a collection of internet-connected devices that have been hijacked by malware and are being controlled remotely by a malicious actor.
Rate this question:
9.
________ is a cyber attack intended to redirect a website's traffic to another, fake site.
Correct Answer Pharming
Explanation Pharming is a type of cyber attack where hackers manipulate the DNS (Domain Name System) to redirect website traffic to a fake site. This fake site is designed to mimic the original website, tricking users into entering sensitive information such as login credentials or financial details. Unlike phishing, where users are lured to the fake site through deceptive emails or messages, pharming directly redirects users to the malicious site without their knowledge or consent. This attack can be carried out by exploiting vulnerabilities in DNS servers or by infecting users' computers with malware that alters their DNS settings.
Rate this question:
10.
Hacking is the process by which cybercriminals gain access to your computer.
A.
True
B.
False
Correct Answer
A. True
Explanation Hacking is indeed the process by which cybercriminals gain unauthorized access to a computer system. It involves exploiting vulnerabilities in the system's security measures to gain control or extract sensitive information. Hackers can use various techniques and tools to carry out their attacks, such as malware, phishing, or brute-force attacks. Therefore, the statement "Hacking is the process by which cybercriminals gain access to your computer" is true.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.