Information Technology Reference
In-Depth Information
Test Yourself
Fact Check
What type of program would a hacker use to capture the password someone has typed?
keylooker
keylogger
keyloader
keyblocker
Which of the following types of malware are designed to infect multiple files on your
computer?
worm
virus
Trojan
rogue
Which of the following types of malware is likely to use your address book to spread itself to
other computers?
virus
Trojan
spam
worm
Which of the following would be the strongest password?
August23
birmingham
NewYork
M3rl1n@t
What is the name of a single piece of software that looks innocent but carries out malicious
activity on your computer?
virus
worm
router
Trojan
What is the name used for a computer that launches denial of service (DoS) attacks over the
Internet?
rogue
evil twin
spam bot
zombie
Search WWH ::




Custom Search