Quiz 1.4: Network Security
A memory stick, loaded with malware, is purposely left for a victim to find and use. This is known as…
Which category of "hacker" breaks into a system without the owners permission, hoping to collect a reward for finding vulnerabilities?
Which type of malware shows unwanted adverts?
Which category of "hacker" breaks into a system without the owners permission, to steal or damage information?
What is the term for the process of converting data into an unreadable form to prevent unauthorised access?
What is the term for the physical or logical arrangement of devices on a network?
Which category of "hacker" breaks into a system with the owners permission?
What is the name of the attack that involves flooding a target with network traffic to make it inaccessible?
Manipulating a person so that their private information can be obtained is known as…
Which of the following could be used as an SQL injection?