Quiz 6 of 9
Check: Attack Scenarios
Time limit: 0
0 of 2 Fragen completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 2 Fragen answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Please repeat the quiz.
Congratulations! You have passed this quiz.
On the basis of which indications can a phishing mail be recognised?CorrectIncorrect
Assign the approach to the individual malware programmes:
- Seemingly useful or informative programmes and documents secretly contain malicious programme code.
- Encrypts important data such as documents, pictures or e-mails on an infected computer system so that access to them is no longer possible.
- Misuse a technique implemented in large office applications (such as Microsoft Word (.doc) or Microsoft Excel (.xls)) to create replicating malicious programs.
- They are not attached to a host file, but are stand-alone programs that can spread across networks and computers. They are mostly spread via e-mail attachments.