Spyware Quiz Grade 11
Spyware Quiz Grade 11
11 – 24. Choose your answer on the box below and write it on the blank.
Spyware Keylogging Internet Spam 11 – 24. Choose your answer on the box below and write it on the blank.
Rogue security Netiquette Worm Phishing Spyware Keylogging Internet Spam
software Rogue security Netiquette Worm Phishing
Adware Virus Trojans Pharmers software
11. It displays unwanted ads when a user is surfing Adware Virus Trojans Pharmers
the internet. 11. It displays unwanted ads when a user is surfing
12. This is a form of malicious software and internet the internet.
fraud that misleads users into believing there is a 12. This is a form of malicious software and internet
virus on their computer and convince them to pay fraud that misleads users into believing there is a
for a fake malware removal tool. virus on their computer and convince them to pay
13. They present themselves as harmless computer for a fake malware removal tool.
programs so that hackers can penetrate your 13. They present themselves as harmless computer
computer without being detected. programs so that hackers can penetrate your
14. It can monitor your keystrokes, read and delete computer without being detected.
your files, reformat your hard drive, and access 14. It can monitor your keystrokes, read and delete
your applications. your files, reformat your hard drive, and access
15. These are unwanted emails. your applications.
16. They usually make their way on to a computer 15. These are unwanted emails.
via a malicious email attachment or USB stick. 16. They usually make their way on to a computer
17. They are often attached to files for download, via a malicious email attachment or USB stick.
shared via CDs, DVDs, and USB sticks, or loaded 17. They are often attached to files for download,
on to computers by opening infected email shared via CDs, DVDs, and USB sticks, or loaded
attachments. on to computers by opening infected email
18. These are official-looking emails that are sent attachments.
impersonating a well-known provider, such as a 18. These are official-looking emails that are sent
bank. This is often linked to identity and intellectual impersonating a well-known provider, such as a
property theft. bank. This is often linked to identity and intellectual
19. A code of good behavior on the Internet. property theft.
20. This is defined as an information 19. A code of good behavior on the Internet.
superhighway. 20. This is defined as an information
21. They create web pages mimicking that of a superhighway.
trustworthy business, such as an online banking 21. They create web pages mimicking that of a
log-in page. trustworthy business, such as an online banking
22. This records a user’s keyboard input. log-in page.
23. This is not a direct threat but many can contain 22. This records a user’s keyboard input.
malware. 23. This is not a direct threat but many can contain
24. It leaves your computer completely malware.
unprotected.
24. It leaves your computer completely
unprotected.
25. Who invented world wide web.