A Trojan horse replaces all or part of the legitimate software with the intent of carrying out some harm to the userโs computer system.
Oops!
Check
Okay!
Check
15
Two most common types of antimalware:..
Anti-virus, Anti-spyware:
Oops!
Check
Okay!
Check
15
what is Adware?
Adware is a type of malware. At its least dangerous it will attempt to flood an end-user with unwanted advertising.
Oops!
Check
Okay!
Check
15
Spyware is...
Spyware is software that gathers information by monitoring a userโs activities carried out on their computer.
Oops!
Check
Okay!
Check
15
Difference between Phishing and Pharming?
two similar but different types of cybercrime.Phishing involves sending deceptive communication. Pharming is a more advanced method that manipulates DNS records
Oops!
Check
Okay!
Check
15
Viruses are...
Viruses are programs or program code that replicate (copies themselves) with the intention of deleting or corrupting files
Oops!
Check
Okay!
Check
heart
Other team wins 20 points!
Oops!
seesaw
Swap points!
Okay!
gift
Win 25 points!
Okay!
thief
Give points!
5
10
15
20
25
15
what is Data interception?
Data interception is a form of stealing data by tapping into a wired or wireless communication link.
Oops!
Check
Okay!
Check
15
strong password should contain:
at least one capital letter,ย at least one numerical value,ย at least one other keyboard character
Oops!
Check
Okay!
Check
15
what is Worms?
Worms are a type of stand-alone malware that can self-replicate.
Oops!
Check
Okay!
Check
monster
Reset all scores!
Oops!
seesaw
Swap points!
Okay!
fairy
Take points!
5
10
15
20
25
baam
Lose 25 points!
Oops!
boom
Lose 50 points!
Oops!
gold
Win 50 points!
Okay!
fairy
Take points!
5
10
15
20
25
lifesaver
Give 10 points!
Oops!
15
what is Brute force attack?
If a hacker wants to โcrackโ your password, they can systematically try all the different combinations of letters, numbers and other symbols until eventually