What is the term for any illegal act involving the use of a computer?
What is computer crime?
This type of malware displays unwanted advertisements on your device.
What is adware?
This is the process of converting readable data into coded characters to prevent unauthorized access.
What is encryption?
This type of hacker illegally accesses a network with malicious intent to steal or destroy data.
What is a black hat hacker?
This simple action can protect your computer from many malware infections when downloading software.
What is downloading software with caution?
This type of hacker accesses a computer or network illegally but with no malicious intent.
What is a grey hat hacker?
What type of malware is designed to block or limit access to a system until a payment is made?
What is ransomware?
What do you call a private combination of words used for stronger security than a password?
What is a passphrase?
These hackers work to find security breaches and improve systems.
What are white hat hackers?
Which key combination should you use to close suspicious pop-up windows?
What is Ctrl + F4?
What term refers to a software used by cybercriminals to commit crimes?
What is crimeware?
This type of malware hides within a system and grants hackers remote control of the computer.
What is a rootkit?
This term refers to an encrypted code attached to a message to verify its sender's identity.
What is a digital signature?
This type of hacker uses pre-written hacking programs because they lack technical skills.
What is a script kiddie?
This type of security measure defines who can access a computer and when they can access it.
What are access controls?
This type of cybercriminal demands payment to stop an attack on an organization’s technology infrastructure.
What is a cyberextortionist?
This type of malware logs keystrokes to steal sensitive information like passwords.
What is spyware?
What is the name of the software or hardware designed to protect a network's resources from external threats?
What is a firewall?
A hacker who illegally accesses a network with the intent to cause damage is called a __________.
What is a cracker?
Before using any removable media (like a USB drive), you should perform this action to check for malware.
What is scanning the media for malware?
This type of attack involves using a group of compromised computers, known as a zombie army, to attack other networks.
What is a Distributed Denial of Service (DDoS) attack?
What type of malware replicates itself to spread across a network without needing to be attached to a file?
What is a worm?
What is the process of decoding and reading encrypted data called?
What is decryption?
What is the name for hackers who target computer systems for political reasons?
What are cyberterrorists?
What is the method of using fake websites or emails to trick people into giving away personal information?
What is phishing or spoofing?