Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
A computer threat that copies and spreads, is more serious than a virus, and does not need human assistance is called a
Worm
Authentication
McDsFr3nchFr!3s*
Advertising ID (Ad ID)
Trojan Horse
White Hat Hacker
Geolocation
Spyware
The type of hacker that engages in ethical hacking to help businesses and organizations is called a ___________________?
Worm
Authentication
McDsFr3nchFr!3s*
Advertising ID (Ad ID)
Trojan Horse
White Hat Hacker
Geolocation
Spyware
What is the name of the long complex string of characters used to track your purchases, likes, dislikes, etc.?
Worm
Authentication
McDsFr3nchFr!3s*
Advertising ID (Ad ID)
Trojan Horse
White Hat Hacker
Geolocation
Spyware
GPS data attached to photos on a device may allow people to identify your location. This is called
Worm
Authentication
McDsFr3nchFr!3s*
Advertising ID (Ad ID)
Trojan Horse
White Hat Hacker
Geolocation
Spyware
The type of threat that may be on your device, now, that can track the keys you press is called __________?
Worm
Authentication
McDsFr3nchFr!3s*
Advertising ID (Ad ID)
Trojan Horse
White Hat Hacker
Geolocation
Spyware
What is the process that is used to verify a user with a login and password?
Worm
Authentication
McDsFr3nchFr!3s*
Advertising ID (Ad ID)
Trojan Horse
White Hat Hacker
Geolocation
Spyware
What is the type of computer threat named for a historical war gift/trick?
Worm
Authentication
McDsFr3nchFr!3s*
Advertising ID (Ad ID)
Trojan Horse
White Hat Hacker
Geolocation
Spyware
Which of the following is an example of a safe password?
Worm
Authentication
McDsFr3nchFr!3s*
Advertising ID (Ad ID)
Trojan Horse
White Hat Hacker
Geolocation
Spyware
Check it!