0 of 8 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 8 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
What malware is used specifically to get unauthorised remote administrator access to a computer or network?
What technology is usually used by ransomware to prevent you from accessing your computer system?
All malware is designed to maliciously steal or damage data on a computer system.
Which of the following is a common reason individuals perform hacking attacks?
Companies and governments sometimes use hacking for espionage purposes.
Which of the following are a common form of sabotage from an external source?
Sabotage is sometimes performed as a method of gaining confidential information, with no malicious damage intended.
Phishing emails are an example of a social engineering threat to IT systems. What are two possible goals of a phishing email?