| Hint | Answer | % Correct |
|---|---|---|
| a person who uses computers to gain unauthorized access to data | hacker | 100%
|
| a computer program that attaches itself to other computer programs and is designed to spread from PC to PC. It has the ability to replicate itself. | virus | 86%
|
| overwhelm a target website with fake traffic (acronym for) | DDOS | 71%
|
| malware that prevents users from accessing their own file’s and demands ransom payment | ransomware | 71%
|
| A standalone computer program that replicates itself in order to spread to other computers. | worm | 71%
|
| a virus disguised as a non malicious app | trojan | 64%
|
| a collection of internet-connected devices infected by malware that allow hackers to control them | botnet | 43%
|
| When someone works out your password we say your password has been | cracked | 43%
|
| a mathematical algorithm which performs a one-way conversion of input data into output data of a specified size to verify the integrity of the data. | hash | 43%
|
| malware that is designed to infect a target PC and allow an attacker to install a set of tools that grant him persistent remote access to the PC | rootkit | 43%
|
| What type of computer expansion card is used to crack passwords | graphics | 29%
|
| Message-Digest Algorithm 5, a cryptographic function that generates a hash value from any message or string of characters also known as | MD5 | 29%
|
| A potentially unwanted program that adds toolbars and advertising to your browser | PUP | 29%
|
| One piece of software, running on Linux, used to crack passwords is called cuda - | hashcat | 21%
|
| In general every ones password is ... | terrible | 21%
|