Cybercrime
Malware
Security Measures
Hacker Types
Digital Security Best Practices
100

What is the term for any illegal act involving the use of a computer?

What is computer crime?

100

This type of malware displays unwanted advertisements on your device.

What is adware?

100

This is the process of converting readable data into coded characters to prevent unauthorized access.

What is encryption?

100

This type of hacker illegally accesses a network with malicious intent to steal or destroy data.

What is a black hat hacker?

100

This simple action can protect your computer from many malware infections when downloading software.

What is downloading software with caution?

200

This type of hacker accesses a computer or network illegally but with no malicious intent.

What is a grey hat hacker?

200

What type of malware is designed to block or limit access to a system until a payment is made?

What is ransomware?

200

What do you call a private combination of words used for stronger security than a password?

What is a passphrase?

200

These hackers work to find security breaches and improve systems.

What are white hat hackers?

200

Which key combination should you use to close suspicious pop-up windows?

What is Ctrl + F4?

300

What term refers to a software used by cybercriminals to commit crimes?

What is crimeware?

300

This type of malware hides within a system and grants hackers remote control of the computer.

What is a rootkit?

300

This term refers to an encrypted code attached to a message to verify its sender's identity.

What is a digital signature?

300

This type of hacker uses pre-written hacking programs because they lack technical skills.

What is a script kiddie?

300

This type of security measure defines who can access a computer and when they can access it.

What are access controls?

400

This type of cybercriminal demands payment to stop an attack on an organization’s technology infrastructure.

What is a cyberextortionist?

400

This type of malware logs keystrokes to steal sensitive information like passwords.

What is spyware?

400

What is the name of the software or hardware designed to protect a network's resources from external threats?

What is a firewall?

400

A hacker who illegally accesses a network with the intent to cause damage is called a __________.

What is a cracker?

400

Before using any removable media (like a USB drive), you should perform this action to check for malware.

What is scanning the media for malware?

500

This type of attack involves using a group of compromised computers, known as a zombie army, to attack other networks.

What is a Distributed Denial of Service (DDoS) attack?

500

What type of malware replicates itself to spread across a network without needing to be attached to a file?

What is a worm?

500

What is the process of decoding and reading encrypted data called?

What is decryption?

500

What is the name for hackers who target computer systems for political reasons?

What are cyberterrorists?

500

What is the method of using fake websites or emails to trick people into giving away personal information?

What is phishing or spoofing?

M
e
n
u