How much do you know about cybersecurity? Take our quiz.

Are you smarter about real-life computer security and cyberconflict than Skynet, the evil computer network in the "Terminator" movie series? Take this quiz to find out:

2. What term describes software that allows a hacker to remotely take control of a computer while avoiding detection?

A rootkit is also known as a "Trojan" program after the Trojan horse of Greek mythology – pretending to do one thing while doing another.

A rootkit is also known as a "Trojan" program after the Trojan horse of Greek mythology – pretending to do one thing while doing another.

A rootkit is also known as a "Trojan" program after the Trojan horse of Greek mythology – pretending to do one thing while doing another.

A rootkit is also known as a "Trojan" program after the Trojan horse of Greek mythology – pretending to do one thing while doing another.

(Read caption)

Linux

 

rootkit

 

botnet

 

DDoS

 
Javascript is disabled. Quiz scoring requires Javascript.

Loading...

Loading...

Loading...