暗記メーカー
ログイン
lesson 3
  • ユーザ名非公開

  • 問題数 70 • 6/18/2024

    記憶度

    完璧

    10

    覚えた

    26

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

    pharming

  • 2

    Delete your files.

    trojan horses

  • 3

    is one of the more common ways to infiltrate or damage your computer.

    malware

  • 4

    is one of the more common methods of both sending information out and collecting it from unsuspecting people.

    spam

  • 5

    Virtual "listening in" on information that's shared over an unsecure (not encrypted) WiFi network.

    Wi-Fi Eavesdropping

  • 6

    Create a burden for communications service providers and businesses to filter electronic messages.

    spam

  • 7

    A malicious program that is disguised as, or embedded within, legitimate software.

    trojan horses

  • 8

    Reformat the hard drive of your computer causing you to lose all your information.

    malware

  • 9

    Take you to unwanted sites or inundate you with uncontrollable pop-up ads.

    Spyware & Adware

  • 10

    Send emails on your behalf.

    malware

  • 11

    Steal sensitive information.

    malware

  • 12

    displays an image that prevents you from accessing your computer

    lockscreen ransomware

  • 13

    They often come in the form of a 'free' download and are installed automatically with or without your consent.

    Spyware & Adware

  • 14

    These are difficult to remove and can infect your computer

    Spyware & Adware

  • 15

    Provide a vehicle for malware, scams, fraud and threats to your privacy.

    spam

  • 16

    It is often presented in a manner than seems official and intimidating, to encourage you to take action.

    phishing

  • 17

    will display a notification stating that your computer or data have been locked and demanding a payment be made for you to regain access.

    ransomware

  • 18

    Potentially access your computer with the right equipment.

    Wi-Fi Eavesdropping

  • 19

    common types of ransomware:

    1. Lockscreen ransomware 2. Encryption ransomware

  • 20

    It is an executable file that will install itself and run automatically once it's downloaded.

    trojan horses

  • 21

    is another method used by cyber criminals to capture personal information.

    Wi-Fi Eavesdropping

  • 22

    Spread to everyone in your contact list.

    worms

  • 23

    Take control of your computer and all the software running on it.

    malware

  • 24

    Cause a tremendous amount of damage by shutting down parts of the Internet, wreaking havoc on an internal network and costing companies enormous amounts of lost revenue.

    worms

  • 25

    is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort.

    phishing

  • 26

    The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.

    spam

  • 27

    This is also known as "spoofing".

    phishing

  • 28

    Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information.

    malware

  • 29

    Watch you through your web cam.

    trojan horses

  • 30

    Disable your security settings.

    virus

  • 31

    ___providing a back door for hackers to enter and search for your information.

    trojan horse

  • 32

    Provides cyber criminals with your username and passwords so that they can access your accounts your online bank account, shopping accounts and steal your credit card numbers.

    phishing

  • 33

    When a program is running, it could infiltrate your hard drive and also spread to USB keys and external hard drives.

    virus

  • 34

    infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.

    malware

  • 35

    Trick you into giving them information by asking you to update, validate or confirm your account.

    phishing

  • 36

    Steal your personal information including logins and passwords.

    Wi-Fi Eavesdropping

  • 37

    goes to work on its own without attaching itself to files or programs.

    worms

  • 38

    Phish for your information by tricking you into following links or entering details with too-good-to-be-true offers and promotions.

    spam

  • 39

    is a common type of online fraud.

    pharming

  • 40

    The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities.

    hacking

  • 41

    Annoy you with unwanted junk mail.

    spam

  • 42

    actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent.

    pharming

  • 43

    Hijack your web browser.

    virus

  • 44

    encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them

    encryption ransomware

  • 45

    It lives in your computer memory, doesn't damage or alter the hard drive and propagates by sending itself to other computers in a network

    worms

  • 46

    Use your computer to hack other computers.

    trojan horses

  • 47

    Find weaknesses or pre-existing bugs in your security settings and exploit them in order to access your information.

    hacking

  • 48

    the notification states that authorities have detected illegal activity on your computer, and that the payment is a fine to avoid prosecution.

    ransomware

  • 49

    are a common threat to computers and the Internet as a whole.

    worms

  • 50

    Fake emails, text messages and websites created to look like they're from authentic companies.

    phishing

  • 51

    Scan and find personal information like passwords on your computer.

    virus

  • 52

    They're sent by criminals to steal personal and financial information from you.

    phishing

  • 53

    The process by which cyber criminals gain access to your computer.

    hacking

  • 54

    Send spam.

    virus

  • 55

    Record usernames, passwords and other personal information.

    trojan horses

  • 56

    Alter or delete files.

    malware

  • 57

    Change the way your computer runs without your knowledge.

    Spyware & Adware

  • 58

    Collect information about you without you knowing about it and give it to third parties.

    Spyware & Adware

  • 59

    Is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.

    ransomware

  • 60

    Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list.

    virus

  • 61

    Install a Trojan horse, providing a back door for hackers to enter and search for your information.

    hacking

  • 62

    Any attachment you create using this program and send to someone else could also infect them

    virus

  • 63

    The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements.

    ransomware

  • 64

    is a term used to describe actions taken by someone to gain unauthorized access to a computer.

    hacking

  • 65

    Send your usernames, passwords, surfing habits, list of applications you've downloaded,

    Spyware & Adware

  • 66

    Provide criminals with access to your computer and contact lists.

    virus

  • 67

    often used by third parties to infiltrate your computer.

    Spy & adware

  • 68

    Log your key strokes such as a credit card number you entered in an online purchase.

    trojan horses

  • 69

    Display unwanted ads.

    virus

  • 70

    Software that collects personal information about you without you knowing.

    Spyware & Adware