Information Technology Reference
In-Depth Information
Test Yourself
Fact Check
1
What type of program would a hacker use to capture the password someone has typed?
a
keylooker
b
keylogger
c
keyloader
d
keyblocker
2
Which of the following types of malware are designed to infect multiple files on your
computer?
a
worm
b
virus
c
Trojan
d
rogue
3
Which of the following types of malware is likely to use your address book to spread itself to
other computers?
a
virus
b
Trojan
c
spam
d
worm
4
Which of the following would be the strongest password?
a
August23
b
birmingham
c
NewYork
d
M3rl1n@t
5
What is the name of a single piece of software that looks innocent but carries out malicious
activity on your computer?
a
virus
b
worm
c
router
d
Trojan
6
What is the name used for a computer that launches denial of service (DoS) attacks over the
Internet?
a
rogue
b
evil twin
c
spam bot
d
zombie