Hint | Answer | % Correct |
---|---|---|
a person who uses computers to gain unauthorized access to data | hacker | 100%
|
a computer program that attaches itself to other computer programs and is designed to spread from PC to PC. It has the ability to replicate itself. | virus | 100%
|
overwhelm a target website with fake traffic (acronym for) | DDOS | 90%
|
malware that prevents users from accessing their own file’s and demands ransom payment | ransomware | 90%
|
A standalone computer program that replicates itself in order to spread to other computers. | worm | 90%
|
a virus disguised as a non malicious app | trojan | 80%
|
a collection of internet-connected devices infected by malware that allow hackers to control them | botnet | 60%
|
When someone works out your password we say your password has been | cracked | 60%
|
a mathematical algorithm which performs a one-way conversion of input data into output data of a specified size to verify the integrity of the data. | hash | 50%
|
What type of computer expansion card is used to crack passwords | graphics | 40%
|
Message-Digest Algorithm 5, a cryptographic function that generates a hash value from any message or string of characters also known as | MD5 | 40%
|
A potentially unwanted program that adds toolbars and advertising to your browser | PUP | 40%
|
malware that is designed to infect a target PC and allow an attacker to install a set of tools that grant him persistent remote access to the PC | rootkit | 40%
|
One piece of software, running on Linux, used to crack passwords is called cuda - | hashcat | 30%
|
In general every ones password is ... | terrible | 30%
|
Copyright H Brothers Inc, 2008–2024
Contact Us | Go To Top | View Mobile Site