Other questions in this quiz

2. Gathers information on the user it has infected, secretly sending it away to third-party sources – this may be through the use of keyloggers, which get information from what you type, such as passwords.

  • Spyware
  • Rootkits
  • Viruses
  • Trojans

3. Malicious code that hides within a seemingly legitimate program. Typically, users are misled and download the it themselves by thinking it’s a program they would like to use.

  • Viruses
  • Trojans
  • Spyware
  • Adware

4. Used to get unauthorised remote administrator access to a computer or network. They typically spread by hiding in software that appears to offer legitimate functionality. This can then be used to steal data or hide other malware within the system.

  • Viruses
  • Adware
  • Rootkits
  • Trojans

5. Perform a similar function to viruses. However, they can replicate themselves through a network to spread to other computers, rather than through infecting files that are spread.

  • Viruses
  • Worms
  • Adware
  • Trojans

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Malware resources »