Question 1
How can SQL injection attacks be described?
Question 2
Which type of malware is typically hidden in legitimate software and used to spy on or corrupt files?
Question 3
Which cyber attack method involves guessing passwords using common combinations or brute force?
Question 4
What kind of attack did Anne experience through the fake email?
Question 5
Which type of attack uses multiple systems to flood a network with traffic and block legitimate requests?
Question 6
A hacker intercepting communication between a device and server exemplifies which type of attack?
Question 7
What is a honeypot used for in cybersecurity?
Question 8
Which cybersecurity role involves identifying vulnerabilities and resolving them?
Question 9
What is an Advanced Persistent Threat (APT)?
Question 10
What is the function of antivirus software?
Question 11
Why is cybersecurity considered a lucrative career choice?
Question 12
What is likely to increase due to the rise in global digital data?
Question 13
What is the primary purpose of a firewall in cybersecurity?
Question 14
What is a characteristic of Man-in-the-Middle attacks?
Question 15
What does a Chief Information Security Officer (CISO) primarily ensure?