Quiz for:
Cyber Security: Understanding Threats and Protections

Question 1

How can SQL injection attacks be described?

Question 2

Which type of malware is typically hidden in legitimate software and used to spy on or corrupt files?

Question 3

Which cyber attack method involves guessing passwords using common combinations or brute force?

Question 4

What kind of attack did Anne experience through the fake email?

Question 5

Which type of attack uses multiple systems to flood a network with traffic and block legitimate requests?

Question 6

A hacker intercepting communication between a device and server exemplifies which type of attack?

Question 7

What is a honeypot used for in cybersecurity?

Question 8

Which cybersecurity role involves identifying vulnerabilities and resolving them?

Question 9

What is an Advanced Persistent Threat (APT)?

Question 10

What is the function of antivirus software?

Question 11

Why is cybersecurity considered a lucrative career choice?

Question 12

What is likely to increase due to the rise in global digital data?

Question 13

What is the primary purpose of a firewall in cybersecurity?

Question 14

What is a characteristic of Man-in-the-Middle attacks?

Question 15

What does a Chief Information Security Officer (CISO) primarily ensure?