❓ What is adware?
✅ Software that displays unwanted advertisements and may track user activity.
❓ What is an attack?
✅ Any attempt to gain unauthorized access, disrupt, or harm a system or network.
❓ What is a backdoor?
✅ A hidden entry point in software that allows unauthorized access to a system.
❓ What is a botnet?
✅ A network of compromised computers (zombies) controlled remotely to perform malicious activities.
❓ What is a buffer overflow attack?
✅ An attack that exploits programming flaws by overflowing a memory buffer, potentially allowing an attacker to execute malicious code.
❓ What is computer security?
✅ The practice of protecting systems, networks, and data from cyber threats.
❓ What is a denial-of-service (DoS) attack?
✅ An attack that floods a system with traffic, making it unavailable to legitimate users.
❓ What is a distributed denial-of-service (DDoS) attack?
✅ A DoS attack performed using multiple compromised computers (botnet) to amplify the attack.
❓ What is an exploit?
✅ A piece of code or technique used to take advantage of a vulnerability in a system.
❓ What are keyloggers?
✅ Malware that records keystrokes to steal sensitive information, such as passwords.
❓ What is a macro virus?
✅ A virus that infects documents and spreads through macros in programs like Microsoft Word or Excel.
❓ What is malware?
✅ Malicious software designed to harm, exploit, or disable computers and networks.
❓ What is network security?
✅ The practice of protecting networks from unauthorized access, attacks, and vulnerabilities.
❓ What is a Ping of Death attack?
✅ A type of DoS attack that sends oversized or malformed packets to crash a system.
❓ What is ransomware?
✅ Malware that encrypts files and demands payment (ransom) to restore access.
❓ What is a rootkit?
✅ A stealthy type of malware that hides deep in the system to maintain persistent access.
❓ What is a shell?
✅ A command-line interface that allows users to interact with an operating system.
❓ What is spyware?
✅ Malware that secretly gathers information about a user and sends it to a third party.
❓ What is a Trojan program?
✅ Malware that disguises itself as legitimate software but performs malicious activities once executed.
❓ What is a virus?
✅ A malicious program that replicates itself and spreads by attaching to files or software.
❓ What is a virus signature file?
✅ A database of known virus patterns used by antivirus software to detect threats.
❓ What is a vulnerability?
✅ A security flaw or weakness that attackers can exploit to gain unauthorized access.
❓ What is whitelisting?
✅ A security measure that allows only approved applications or users to access a system.
❓ What is a worm?
✅ A self-replicating malware that spreads across networks without user interaction.
❓ What are zombies?
✅ Infected computers in a botnet that execute commands from an attacker without the owner's knowledge.