Other questions in this quiz

2. Gathers information on the user it has infected, secretly sending it away to third-party sources – this may be through the use of keyloggers, which get information from what you type, such as passwords.

  • Trojans
  • Rootkits
  • Spyware
  • Viruses

3. Malicious code that hides within a seemingly legitimate program. Typically, users are misled and download the it themselves by thinking it’s a program they would like to use.

  • Viruses
  • Adware
  • Trojans
  • Spyware

4. Modify existing programs with malicious code and constantly replicates itself throughout a computer. They usually cause the corruption of data and applications, system failure & take up storage space or processing power.

  • Viruses
  • Rootkits
  • Adware
  • Spyware

5. Used to get unauthorised remote administrator access to a computer or network. They typically spread by hiding in software that appears to offer legitimate functionality. This can then be used to steal data or hide other malware within the system.

  • Viruses
  • Adware
  • Rootkits
  • Trojans

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Malware resources »