While browsing the internet users can unwittingly download spyware, or become victims of phishing and keylogging software. Fraud, identity theft and server attacks are also becoming more commonplace.
Which of the following types of software is definitely malicious?
What does spyware do?
Helps the user to find things that are lost
Monitors user activity on the internet and transmits that information in the background to someone else
Randomly plays adverts from the sponsors of the software
Which of the following can lead to system access for Trojan software?
Installing third party browser toolbar add ons
Updating operating system software
Accessing your own cloud storage folder
Software products from reputable companies, where you will be viewing sponsored advertisements until a commercial fee is paid, are known as what?
Which of the following best describes ‘tracking cookies’?
Text files that are used to enhance your browsing experience by remembering data entered on websites
Text files that act as normal cookies but send information to third parties without permission
Text files that track orders form e-commerce websites
Which of the following best describes a Denial of Service (DOS) attack?
An attack from within an operating system, designed to replicate and attach to files
An attack designed to take down a server, often by overloading a server to the point that it cannot accept legitimate traffic
Software that will send browsing habits to third parties without user consent
Which type of denial of service attack is designed to intercept data sent on a network to prevent data from being kept secure or reaching its intended target?
A person who can be hired to carry out denial of service attacks is likely to be motivated by which of the following?
Which of the following is a possible symptom of a Denial of Service attack?
Inability to access a website
Random shut down of a home PC
Which of the following is a potential cost to an organisation who fall victim to a Denial of Service attack?
Cost of employing staff or hiring additional staff to bring servers and services back to pre-attack levels
Cost of new hardware that has been physically damaged
Cost of new security measures to prevent hackers gaining access to building hosting servers