1. Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to private computer systems are commonly referred to as:
4. What is the name of the automated processes that are designed to interact over the internet without the need of human interaction?
5. Spyware programs track your browsing habits and other personal details and send it to a remote user.
6. A computer program containing malicious segment that attaches itself to an application program or other executable component is called:
7. Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is known as:
8. Which type of files pose the greatest risk related to the distribution of malware?
9. In computer security, an automatic download performed without the user's consent (and often without any notice) aimed at installing malware or potentially unwanted programs is known as a drive-by download.
10. A computer virus that actively attacks an antivirus program in an effort to prevent detection is called:
12. A type of Trojan designed to transfer other malware onto a PC via Internet connection is known as:
13. What is the function of Windows Defender software?
14. Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?
15. How can you protect your computer from malware?
16. Which of these application types fall(s) into the category of anti-malware solutions?
17. Which of the following components pose(s) a risk of unintended downloading and execution of malware on a PC?
19. The process by which malicious software changes its underlying code in order to avoid detection is known as polymorphism.
20. An antivirus software can be kept up to date through: