What is it called when an attacker convinces you to enter personal information quizlet?

How is a worm different from a Trojan?

a. A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network.
b. A worm spreads through a network, whereas a Trojan hides inside another program.
c. A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network.
d. A worm prevents a device from functioning until a ransom is paid, whereas a Trojan gathers information and transmits it to another device.

How can an attacker execute malware through a script quizlet?

How can an attacker execute malware through a script? A script can run a series of instructions to download and run malware. An add-on might allow your computer to download a "script" or series of instructions that commands the browser to perform specific actions.

What would a password manager allow you to do?

A password manager (or a web browser) can store all your passwords securely, so you don't have to worry about remembering them. This allows you to use unique, strong passwords for all your important accounts (rather than using the same password for all of them, which you should never do).

How is a worm different from a Trojan quizlet?

How is a worm different from a Trojan? -A worm reproduces itself on the same computer, whereas a Trojan attempts to spread through the network. -A worm gathers information and transmits to a server, whereas a Trojan hides and then spreads through a network.

How does encryption work quizlet?

How does encryption work? Encryption transforms a message or data file in such a way that its contents are hidden from unauthorized readers. An original message or file that has not yet been encrypted is referred to as plaintext or cleartext. An encrypted message or file is referred to as ciphertext.