Other questions in this quiz

2. Gathers information on the user it has infected, secretly sending it away to third-party sources – this may be through the use of keyloggers, which get information from what you type, such as passwords.

  • Rootkits
  • Viruses
  • Spyware
  • Trojans

3. Malicious code that hides within a seemingly legitimate program. Typically, users are misled and download the it themselves by thinking it’s a program they would like to use.

  • Spyware
  • Trojans
  • Adware
  • Viruses

4. Prevents you from accessing your computer system, often by encrypting the storage devices, and demands a sum of money to be paid in order to gain access back.

  • Adware
  • Ransomware
  • Rootkits
  • Viruses

5. Used to get unauthorised remote administrator access to a computer or network. They typically spread by hiding in software that appears to offer legitimate functionality. This can then be used to steal data or hide other malware within the system.

  • Rootkits
  • Adware
  • Trojans
  • Viruses

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Malware resources »