3.02 Part II: Question Preview (ID: 20004)

Below is a preview of the questions contained within the game titled 3.02 PART II: Key Terms .To play games using this data set, follow the directions below. Good luck and have fun. Enjoy! [print these questions]

Play games to reveal the correct answers. Click here to play a game and get the answers.

Software that uses computer networks and security holes to replicate itself.
a) Virus b) Trojan Horse c) Worm d) Phishing
Computer program hidden within the shell of another program with an alternative intent such as a virus.
a) Worm b) Virus c) Hacker d) Trojan Horse
It is a person who gains unauthorized access to a computing device or network.
a) Hacker b) Malware c) Spyware d) Trojan Horse
The act of masquerading as a trustworthy website or email to acquire user information; identity theft is the intent
a) Spyware b) Phishing c) Malware d) Worm
It is malicious software meant to gain access, disrupt computer operation, or gather sensitive information.
a) Spyware b) Phishing c) Malware d) Virus
It is a type of malware that collects user information by tracking the habits of users
a) Identity Fraud b) Denial of Service (DoS) or Distributed Denial of Service (DDoS) c) Malware d) Spyware
An attempt to make a machine or network resource unavailable to its intended users
a) Adware b) Antivirus Software c) Denial of Service (DoS) or Distributed Denial of Service (DDoS) d) Identity Fraud
A physical device or application designed to deny incoming or outgoing traffic on a network.
a) Authentication b) Firewall c) Botnet d) Antivirus Software
Application used to prevent infection from risks.
a) Antivirus Software b) Identity Fraud c) Denial of Service (DoS) or Distributed Denial of Service (DDoS) d) Hacker
Advertising software that automatically generates advertisements. It can be legitimately developed software but in some cases it can pose a threat.
a) Antivirus Software b) Password c) Authentication d) Adware
A collection of internet-connected programs communicating with other similar programs in order to perform tasks. Botnets can be used to send spam or participate in a Distributed Denial of Service attacks.
a) Authentication b) Password c) Botnet d) Spyware
A string of characters that allows access to a computer, interface, or system.
a) Authentication b) Password c) Botnet d) Antivirus Software
The process of verifying that you are who you say you are
a) Authentication b) Botnet c) Password d) Firewall
A piece of software that attaches itself to computer programs; viruses replicate and typically have a payload
a) Worm b) Trojan Horse c) Virus d) Hacker
An attempt to use another person's identity to commit a crime.
a) Adware b) Identity Fraud c) Password d) Authentication
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from the data set above, visit ReviewGameZone.com and enter game ID number: 20004 in the upper right hand corner at ReviewGameZone.com or simply click on the link above this text.

Log In
| Sign Up / Register