| Hint | Answer | % Correct |
|---|---|---|
| Software usually hidden within another seemingly harmless program that can produce copies of itself and insert them into other programs or files | Virus | 91%
|
| Prevents a user from accessing their files until a ransom is paid | Ransomware | 73%
|
| A stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files. | Worm | 64%
|
| Secretly monitors user activity, such as browsing habits or login credentials and sends this information to attackers. | Spyware | 55%
|
| Misrepresents itself to masquerade as a regular program or utility in order to persuade a victim to install it. Usually carries a hidden destructive function that is activated when the application is started | Trojan horse | 45%
|
| Malware thats is used to generate money by making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. | Click Fraud | 9%
|
| Any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware | Grayware | 9%
|