1.
The form of online fraud similar to phishing that redirects victims to the fake website instead of baiting through an email or a link is called .
Correct Answer
B. pHarming
Explanation
Pharming is a form of online fraud similar to phishing, where victims are redirected to a fake website instead of being baited through an email or link. In pharming attacks, hackers manipulate the DNS (Domain Name System) settings or use malicious software to redirect users to fraudulent websites that resemble legitimate ones. Once on the fake website, victims may unknowingly provide personal information, such as login credentials or credit card details, which can then be used for fraudulent purposes. This method allows attackers to target a larger number of users compared to traditional phishing methods.
2.
When you pay the creator of the ransomware that currently infects your computer you are guaranteed to get your computer back. State true or false.
Correct Answer
B. False
Explanation
Paying the creator of the ransomware does not guarantee that you will get your computer back. In fact, it is generally advised not to pay the ransom as it encourages the perpetrators and there is no guarantee that they will provide the necessary decryption key or restore your computer's functionality. Additionally, paying the ransom may also make you a target for future attacks.
3.
Websites use _________ to verify users as human and prevent malicious bot attacks.
Correct Answer
B. CAPTCHA
Explanation
Websites use CAPTCHA to verify users as human and prevent malicious bot attacks. CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. It is a security measure that requires users to complete a task or solve a puzzle to prove their human identity. This helps to differentiate between genuine human users and automated bots, ensuring the security and integrity of the website.
4.
Name the malicious program that cannot do anything until actions are taken to activate the file attached by the malware.
Correct Answer
C. Virus
Explanation
A virus is a malicious program that requires specific actions to be taken in order to activate the file attached by the malware. Once the file is activated, the virus can execute its harmful actions, such as corrupting files or stealing personal information. Unlike other types of malware, a virus cannot automatically spread and carry out its malicious activities without user intervention.
5.
Which of these methods is NOT a sufficient way to prevent malware attacks?
Correct Answer
B. Having your firewall on.
Explanation
Having your firewall on is not a sufficient way to prevent malware attacks because while a firewall can help block unauthorized access to your network, it does not provide comprehensive protection against malware. Malware can still enter your system through other means such as malicious email attachments, infected websites, or social engineering tactics. Therefore, it is important to combine firewall protection with other security measures such as using and updating legitimate security software, performing daily scans, and practicing safe browsing habits.
6.
Which option below is a sign that suggests the email you received from your bank is possibly forged and an attempt at phishing?
Correct Answer
C. The email contains spelling and grammar mistakes.
Explanation
Spelling and grammar mistakes in an email from a bank can be a sign that it is possibly forged and an attempt at phishing. Legitimate institutions typically have professional communication standards and would not have such errors in their official correspondence.
7.
Worms can spread and harm independently. State true or false.
Correct Answer
A. True
Explanation
Worms are a type of self-replicating malware that can spread from one computer to another without any human intervention. They have the ability to harm computer systems and networks by consuming system resources, slowing down performance, and even causing data loss. Therefore, it is true that worms can spread and harm independently.
8.
What do we call an attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information?
Correct Answer
B. Eavesdropping
Explanation
Eavesdropping is the correct answer because it refers to the act of intercepting and listening to private communications without the knowledge or consent of the parties involved. In this context, the attack focuses on capturing small packets from the network transmitted by other computers and reading the data content to gather information. Phishing, scams, and exploits are not directly related to capturing small packets from the network and reading data content.
9.
Name the malicious program that cannot do anything until actions are taken to activate the file attached by the malware.
Correct Answer
B. Virus
Explanation
A virus is a type of malicious program that cannot do anything until actions are taken to activate the file attached by the malware. Once activated, the virus can replicate itself and spread to other files or systems, causing harm to the infected device or network. Unlike worms or Trojan horses, viruses require user interaction or specific triggers to initiate their destructive actions. Phishing, on the other hand, is a form of online scam that aims to deceive users into revealing sensitive information, but it does not rely on files or activation to carry out its fraudulent activities.