Skip to main content

Internet Threats Quiz

Have a go at these questions:

1

Internet Threats 1A

What type of file does key logger software typically use to store its recordings?

a)
b)
c)
d)
Well Done! That is correct.No, try again!Your answer has been saved.
Check your answer

2

Internet Threats 1B

What hardware does a rogue dialler make use of for this type of Internet scam to work?

a)
b)
c)
d)
Well Done! That is correct.No, try again!Your answer has been saved.
Check your answer

Next: Spam