Match each of the following terms to its meaning:
I. spear phishing
II. rootkit
III. scareware
IV. zombie
V. spyware
A) programs that allow hackers to gain access to your computer without your knowledge
B) malware on your computer used to convince you that your computer has a virus
C) a computer controlled by a hacker
D) sending e-mails to people known to be customers of a company in an effort to get individuals to reveal sensitive data
E) transmits information about you, such as your Internet-surfing habits
Correct Answer:
Verified
Q25: Ethical hackers are also known as white-hat
Q37: A denial-of-service attack can be used to
Q43: A stealth virus is designed to infect
Q46: Virtual private networks (VPNs) are secure networks
Q49: Currently, there are no antivirus programs for
Q57: An encryption virus replicates itself onto a
Q59: Since you can always redownload program files,
Q62: Another name for a sniffer is a(n)
Q63: Match each of the following terms to
Q69: Match each of the following terms to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents