1.
An independent self-replicating program that spreads from computer to computer.
Correct Answer
B. Worm
Explanation
A worm is an independent self-replicating program that spreads from computer to computer. Unlike viruses, worms do not need to attach themselves to a host file or program and can spread through various methods such as email, instant messaging, or network vulnerabilities. They can cause harm to computer systems by consuming network bandwidth, slowing down computer performance, or even deleting files. Therefore, a worm is the correct answer as it fits the description of an independent self-replicating program that spreads from computer to computer.
2.
Malware Disguised as a legitimate file or program in order to trick users into downloading and opening it.
Correct Answer
B. Trojan Horse
Explanation
A Trojan Horse is a type of malware that appears to be a legitimate file or program, but actually contains malicious code. It tricks users into downloading and opening it, allowing the malware to gain unauthorized access to the user's system. Unlike viruses or worms, Trojan Horses do not replicate themselves, but they can still cause significant damage by stealing sensitive information, damaging files, or allowing remote control of the infected system.
3.
Software designed to hide or cover-up processes and programs in order to avoid detection and deletion by users or antivirus programs.
Correct Answer
D. Rootkit
Explanation
A rootkit is a type of software that is specifically designed to hide or conceal processes and programs on a computer system. It is created with the intention of avoiding detection and deletion by users or antivirus programs. Unlike viruses or worms, which are more focused on spreading and causing damage, a rootkit's primary goal is to remain hidden and provide unauthorized access to a system. It can be extremely difficult to detect and remove a rootkit, making it a potent tool for cybercriminals.
4.
Malware used to gather information from a computer without the user's knowledge.
Correct Answer
B. Spyware
Explanation
Spyware is a type of malware that secretly collects information from a computer without the user's knowledge or consent. It is designed to monitor the user's online activities, track browsing habits, and gather personal information such as passwords, credit card details, and sensitive data. Unlike viruses or worms, spyware does not replicate itself or harm the computer system directly, but it poses a significant threat to user privacy and security.
5.
A type of spyware that generates "pop-ups."
Correct Answer
A. Adware
Explanation
Adware is a type of spyware that generates "pop-ups." It is a software that displays advertisements on a user's computer, usually in the form of pop-up windows or banners. Adware is often bundled with free software and is installed without the user's knowledge or consent. Its purpose is to generate revenue for the developers by displaying targeted advertisements. Unlike other types of spyware, adware is primarily focused on advertising rather than collecting personal information or gaining unauthorized access to a system.
6.
A type of malware that causes damage to a computer by attaching itself to a legitimate file or program to avoid detection.
Correct Answer
B. Virus
Explanation
A virus is a type of malware that can cause damage to a computer by attaching itself to a legitimate file or program. It is designed to replicate itself and spread to other files and systems, often without the user's knowledge. By disguising itself within legitimate files, a virus can avoid detection and infiltrate a computer system, potentially causing harm such as data loss, system crashes, or unauthorized access.
7.
A breach or violation in a computer's security created by malware which allows a hacker access to the computer.
Correct Answer
A. Backdoor
Explanation
A backdoor is a type of malware that creates a breach or violation in a computer's security, allowing a hacker unauthorized access to the computer. Unlike viruses, worms, or keyloggers, a backdoor specifically focuses on providing a secret entry point for hackers to gain control over the compromised system. This can be done by exploiting vulnerabilities in the computer's operating system or software. Once the backdoor is established, the hacker can remotely access and control the computer, often without the user's knowledge or consent.
8.
Any method of using deceit to gain a person's account login information.
Correct Answer
C. pHishing
Explanation
Phishing refers to the act of tricking individuals into revealing their personal information, such as usernames, passwords, or credit card details, by impersonating a trustworthy entity. This is typically done through deceptive emails, messages, or websites that appear legitimate. The goal is to deceive the victim into willingly providing their login information, which can then be used for malicious purposes. Phishing is a common method used by cybercriminals to gain unauthorized access to user accounts and carry out fraudulent activities.
9.
A software program or hardware device that records all keystrokes on a computer keyboard, used either overtly as a surveillance tool or covertly as spyware.
Correct Answer
C. Keylogger
Explanation
A keylogger is a software program or hardware device that records all keystrokes on a computer keyboard. It can be used overtly as a surveillance tool or covertly as spyware. Keyloggers are often used by hackers to steal sensitive information such as passwords, credit card numbers, and personal messages. They can be installed on a computer without the user's knowledge and can operate in the background, silently recording all keystrokes. This makes keyloggers a significant security threat as they can compromise the privacy and security of a user's personal information.
10.
Software that is intended to damage or disable computers and computer systems.
Correct Answer
B. Malware
Explanation
Malware refers to software that is designed to cause harm or disrupt the normal functioning of computers and computer systems. It is a broad term that encompasses various types of malicious software, including viruses, worms, and Trojan horses. Unlike viruses, which need a host program to attach themselves to, malware can exist independently and spread through various means. It can cause damage by stealing sensitive information, corrupting files, or taking control of a system. Therefore, the correct answer for this question is Malware.