Common Security Info.
Security Threats
Security Threats cont.
100

When you walk away from your computer, you should always do what?

What is lock your computer?

100

What is the term for when an attacker pretends to be a legitimate company via emails, messages or ads in order to steal user information? 

What is phishing? 

100

What do you call a code that looks safe but actually takes control of your computer once it is activated?

What is a Trojan horse?

200

You should make sure to use hard to guess words, along with special characters, both lower-case and upper-case letters and numbers, when creating this. 

What is a password?

200

What do you call a computer program that spreads or self-replicates and requires user interaction to activate?

What is a virus?

200

A software designed to cause damage to a computer.

What is malware? 

300

You should contact your IT group and your supervisor along with shutting down your computer if this happens?

What is malware infection?

300

What do you call a program that tracks where you go on the Internet and what you type?

What is a spyware?

300

With this software, you can protect your data from outside sources. 

What is a firewall?

400

This policy states that users should turn off their computers after they are down using it. 

What is Information Security Policy?

400

What is it called, when an attacker attacks a computer or network that is being used?

What is DoS attack?

400

This type of cyber attack steals information classified information to gain advantage over a government. 

What is cyber espionage? 

M
e
n
u