Hacking 101
Hacking Tools
Hacker Attacks
Computer Viruses 101
Malware and such
100

Any criminal action perpetrated primarily through the use of a computer is what?

    

Cybercrime

100

A program designed to detect and record digital information being transmitted over a network is called what?

Packet analyzer or sniffer

100

When hackers repeatedly make requests of a computer system with the intent to bring it down is called what?

Denial-of-Service (DoS) attack 

100

A malicious computer program designed to spread from one computer to another, causing damage to data and system operations is called what?    

Computer Virus

100

Software that has a malicious intent is called what?

Malware

200

The process by which someone uses personal information about someone else to assume the victim's identity for the purpose of defrauding another, is what?

Identity theft

200

A small segment of data that's sent over a network is called what?

Packet

200

A software toolkit used to find security weaknesses in computer systems is called what?

Exploit Kit

200

A virus that replicates itself into the master boot record of a hard drive, ensuring that it will be loaded into memory immediately is called what?

Boot-sector virus

200

Software that displays sponsored advertisements in a section of your browser window or as a pop-up box is called what?

Adware

300

Anyone who unlawfully breaks into a computer system is called a what?

    

Hacker

300

A program that appears to be something useful or desirable (such as a game or screensaver), but does something malicious in the background instead is called what?

Trojan horse

300

Virtual or not physical communication paths used by computer services (email, web, cloud storage) are called what?

Logical ports

300

A virus that is triggered by the passage of time or on a certain date.

Time bomb virus

300

Unwanted piggyback program that usually downloads with other software you install from the Internet and that runs in the background of your system is called what?

Spyware

400

A person who breaks into systems for non-malicious reasons, such as to test system security vulnerabilities is called a what?    

White-hat hacker

400

A program that gives an outsider remote control over a computer is called a what?

Rootkit

400

A virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number of times is called what?

Logic bomb virus

400

A program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information is called what?

Keystroke logger

500

A person who breaks into systems merely to flaunt their expertise or to attempt to sell their services is called a what?    

Gray-hat hacker

500

A computer that is controlled by a hacker who uses it to launch attacks on other computer systems is called what?

Zombie

500

DoS attacks from more than one zombie (sometimes thousands of zombies) at the same time is called what?

Distributed Denial-of-Service (DDoS) attack

500

A program that attempts to travel between systems through network connections to spread infections is called what?

Worm

500

Small text files that some websites automatically store on your hard drive when you visit them are called what?

Cookies

M
e
n
u