No student devices needed. Know more
15 questions
Program or program code that can replicate/copy itself with the intention of deleting or corrupting files, or cause the computer to malfunction.
Hacking
Phishing
Viruses
Pharming
Software that gathers information by monitoring key presses on the user’s keyboard; the information is then sent back to the person who sent the software.
Viruses
Hacking
Pharming
Spyware/key logging software
Malicious code installed on a user’s hard drive or on the web server; the code will redirect the user to a fake/bogus website without their knowledge.
Hacking
Viruses
Pharming
Phishing
•The act of gaining illegal access to a computer system.
Viruses
Hacking
Pharming
Phishing
The creator sends out a legitimate-looking email; as soon as the recipient clicks on a link in the email/attachment, the user is sent to a fake/bogus website.
Viruses
Hacking
Pharming
Phishing
The act of locating and using wireless internet connections illegally; it only requires a laptop (or other portable device), a wireless network card and an antenna to pick up wireless signals.
Viruses
Pharming
Wardriving
Spyware/key logger software
Which of the following is NOT a security risk of Viruses?
This can lead to fraud or identity theft
Can delete files/data
Can corrupt files/data
Can cause the computer to crash, stop functioning normally or become unresponsive.
Select two methods to avoid the risk of viruses.
Use of wired equivalent privacy (WEP) encryption.
Install anti-virus software
Don’t use software from unknown sources
Use of anti-spyware software
Which of the following is a risk of Spyware/key logging software?
The creator of the malicious code can gain personal data such as bank account numbers from users when they visit the fake website.
Can delete files/data
Gives the originator access to all data entered using a keyboard on the user’s computer.
It is possible to steal a user’s internet time/ allocation by downloading large files.
Select 3 methods to avoid the risks of Wardriving.
Use of wired equivalent privacy (WEP) encryption.
Protect the use of the wireless device by having complex passwords before the internet can be accessed.
Use of firewalls to prevent outside users from gaining access.
The user should always be cautious when opening emails or attachments.
What is a security risk of Wardriving?
The creator of the malicious code can gain personal data such as bank account numbers from users when they visit the fake website.
This can lead to fraud or identity theft.
It is possible to steal a user’s internet time/ allocation by downloading large files.
Gives the originator access to all data entered using a keyboard on the user’s computer.
What is a security threat of Phishing?
The creator of the email can gain personal data such as bank account numbers from user when they visit the fake website.
Data can be deleted, changed or corrupted
Can cause the computer to crash, stop functioning normally or become unresponsive.
It is possible to hack into the wireless network and steal a user’s password and other personal details
Select ONE method to remove security risk of Phishing.
Use of strong passwords and user ids
Use of firewalls to prevent outside users from gaining access.
Using a mouse to select characters from passwords (etc.) rather than typing them in using a keyboard can help reduce the risk.
The user should always be cautious when opening emails or attachments.
Select TWO security risks of Hacking.
Data can be deleted, changed or corrupted
Can cause the computer to crash, stop functioning normally or become unresponsive.
The creator of the email can gain personal data such as bank account numbers from user when they visit the fake website.
This can lead to identity theft or gaining personal information
Hacking isn’t necessarily harmful whilst cracking is ALWAYS totally illegal and is potentially very damaging.
True
False
Explore all questions with a free account