100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

TYPES OF MALWARE AND CYBERSECURITY THREATS

Beoordeling
-
Verkocht
-
Pagina's
3
Cijfer
A+
Geüpload op
01-05-2025
Geschreven in
2024/2025

TYPES OF MALWARE AND CYBERSECURITY THREATS Virus - RIGHT ANSWER -A self-replicating program that infects other programs, causing damage or displaying unwanted content. It requires human action to spread. Trojan Horse - RIGHT ANSWER -A deceptive program disguised as useful but contains malicious code. It can allow unauthorized access or destroy data. Worm - RIGHT ANSWER -A self-replicating program that spreads automatically across networks, exploiting security flaws without human intervention. Spyware - RIGHT ANSWER -Software that secretly collects user data and transmits it to an external party, often for advertising or fraud purposes. Keylogger - RIGHT ANSWER -A type of spyware that records keystrokes to capture sensitive information like passwords and credit card numbers. Drive-by Download - RIGHT ANSWER -Automatic installation of malicious software when visiting a compromised website, often exploiting unpatched systems. Ransomware - RIGHT ANSWER -Malware that encrypts files and demands payment for their release. Scareware - RIGHT ANSWER -Fake security alerts that trick users into purchasing useless or harmful software. Social Engineering - RIGHT ANSWER -Manipulating people through deception to gain access to systems or sensitive information, often by posing as a trusted source. Spam - RIGHT ANSWER -Unsolicited bulk messages, typically sent via email. Phishing - RIGHT ANSWER -Deceptive emails or websites that mimic trusted sources to steal sensitive information (e.g., passwords, financial details). Spear Phishing - RIGHT ANSWER -A targeted version of phishing, aimed at specific individuals or organizations. Denial of Service (DoS) Attack - RIGHT ANSWER -An attack that overwhelms a network or service, making it unavailable. Distributed DoS (DDoS) - RIGHT ANSWER -A larger-scale attack using multiple devices (zombies) to flood a target. Zombie - RIGHT ANSWER -A compromised computer used remotely by hackers for malicious activities, like DoS attacks or spam distribution. Botnet - RIGHT ANSWER -A network of zombie computers controlled by a hacker. Click Fraud - RIGHT ANSWER -Falsely generating clicks on online ads to profit or harm competitors. Identity Theft - RIGHT ANSWER -Stealing and using another person's personal information without their consent. Shoulder Surfing - RIGHT ANSWER -Spying on someone entering sensitive data (e.g., PIN, password) by looking over their shoulder. Dumpster Diving - RIGHT ANSWER -Searching through discarded documents to find confidential information. Catfishing - RIGHT ANSWER -Creating fake social media profiles to deceive and manipulate others, often for romantic scams. Cookies - RIGHT ANSWER -Websites create cookies using scripts (like JavaScript) or through server responses.

Meer zien Lees minder
Instelling
ICT PREDICTOR
Vak
ICT PREDICTOR








Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
ICT PREDICTOR
Vak
ICT PREDICTOR

Documentinformatie

Geüpload op
1 mei 2025
Aantal pagina's
3
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

TYPES OF MALWARE AND CYBERSECURITY
THREATS
Virus - RIGHT ANSWER -A self-replicating program that infects
other programs, causing damage or displaying unwanted content.
It requires human action to spread.



Trojan Horse - RIGHT ANSWER -A deceptive program disguised as
useful but contains malicious code. It can allow unauthorized
access or destroy data.



Worm - RIGHT ANSWER -A self-replicating program that spreads
automatically across networks, exploiting security flaws without
human intervention.



Spyware - RIGHT ANSWER -Software that secretly collects user
data and transmits it to an external party, often for advertising or
fraud purposes.



Keylogger - RIGHT ANSWER -A type of spyware that records
keystrokes to capture sensitive information like passwords and
credit card numbers.



Drive-by Download - RIGHT ANSWER -Automatic installation of
malicious software when visiting a compromised website, often
exploiting unpatched systems.
€6,35
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
PERFECTSCHOOLERS
1,0
(1)

Maak kennis met de verkoper

Seller avatar
PERFECTSCHOOLERS Harvard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4
Lid sinds
1 jaar
Aantal volgers
0
Documenten
156
Laatst verkocht
6 maanden geleden
PERFECTSCHOOLERS

"Dedicated to providing high-quality study materials to help students succeed. In order to facilitate and expedite learning, we distribute notes, guides, and resources on a range of topics. Join us for study tips and content designed to boost your grades!"

1,0

1 beoordelingen

5
0
4
0
3
0
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen