0 of 1 questions completed
Weekly Quiz 18
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
0 of 1 questions answered correctly
Time has elapsed
You have reached 0 of 0 points, (0)
Question 1 of 1
Drag the correct word or phrase to the right-hand column next to its definition.
- Trojan Horse
- Federal Communications Commission (FCC)
Infiltration software that secretly monitors online habits, usually to obtain sensitive information from the user's computer
A malicious computer program hidden inside legitimate software or downloads
A piece of computer code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
A computer programmer who writes or uploads malicious software with the intention to harm computers or commit a crime
Government agency that regulates communications by television, radio, satellite, and cable for all 50 states and U.S. territories
The practice of encoding and decoding data, used online to protect users' information
A network security device that monitors and blocks incoming and outgoing network traffic depending on security settings