250+ Understanding Attack Vectors part-18

Que.They spy on our digital habits and spy on which data is more sensitive or useful for its creator. Who are ‘they’ referring to here?
a. Shareware
b. Ransomware
c. Spyware
d. Freeware
Que.Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
a. advertisers
b. dark-market
c. antivirus company
d. share market
Que.Which of the following activity is not done by spyware?
a. sell internet usage data
b. capture credit card details
c. user’s personal identity
d. steal signature of the different virus
Que.Which of the following activity is not done by spyware ?
a. Monitors your internet activity
b. Track user’s login details and passwords
c. Uninstalls your mobile browser
d. Spy on sensitive information
Que.Spyware is not a powerful & one of the most widespread threats on the internet.
a. True
b. False
c. May be True or False
d. Can’t say
Que.It actually infects your device easily & makes it hard to _____________
a. delete
b. identify
c. modify
d. copy
Que.There are __________ main types of spyware.
a. 2
b. 3
c. 4
d. 5
Que._____________ track the user’s online activities like search queries, history pages & downloads, for selling purposes.
a. Ad-based spyware
b. System Monitors
c. Spy-trojans
d. Tracking cookies
Que._____________ tracks your data and displays those products as ads for promotions.
a. Ad-based spyware
b. System Monitors
c. Spy-trojans
d. Tracking cookies
Que._________________ disguises them as legitimate software & appear as Java or Flash Player updates. They will periodically collect your system data and send it to its creator.
a. Ad-based spyware
b. System Monitors
c. Spy-trojans
d. Tracking cookies

Get code60