Welcome to the Knowledge Mouse Online Quiz
Security+
Questions |
Answers |
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as: |
Malware |
Which of the terms listed below refers to an example of a crypto-malware? |
Ransomware |
A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called: |
Worm |
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as: |
Ransomware |
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that |
True |
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as: |
Rootkit |
Which of the following answers lists an example of spyware? |
Keylogger |