This test is run by .
Note that your final mark will not be saved in the system.
Note that your final mark will not be saved in the system.
4.1 Threats MatchUp
Target Level
Pass
Running Total
0
0%
Attempt
1 of 3
Click on a top box, then click on its match below. Or, drag a top box and drop it onto the correct match. Match all pairs before clicking ‘Check’.
Spyware
Virus
Trojan Horse
Social engineering
Phishing
Legal form of hacking to improve security of a system
Illegal hacking of a system to steal data and carry out malicious activity
Hacking
Malware
Attempting to gain access to a computer system that you do not have permission to access
Software designed to deliberately steal data from or otherwise damage the computer system on which it is installed
Impersonating a trusted person or organisation in order to steal data or manipulate the users of a system
Manipulating the users of a system in order to steal data or gain unauthorised access
Software that collects data from a computer system
Malware that spreads by injecting its code into other files on the computer system
Malicious software allowing full control to a hacker
White hat hacker
Black hat hacker