Why might a person or organisation create malicious software?
- Theft of data
- Blackmail or extortion
- For fun
- All of the above
What is the name of the technique that involves sending deceptive emails to trick users into revealing personal information?
- Phishing
- Brute force
- Denial of service
- SQL injection
Which type of attack typically uses a botnet?
- Distributed denial of service
- Denial of service
- SQL injection
- Brute force
Which type of malware initially appears to be a useful application, but installs additional malware?
- Adware
- Ransomware
- Spyware
- Trojan horse
What is the name of the attack that involves inserting malicious code into a database query?
- Phishing
- Brute force
- Denial of service
- SQL injection
Which of the following is not a method of protection from a man-in-the-middle attack?
- Avoiding unfamiliar Wi-Fi hotspots
- Encrypting communication
- Using a VPN
- Using strong passwords
Listening-in to communications between two devices is known as…
- A man-in-the-middle attack
- Encryption
- Decryption
- Malicious Wi-Fi
Manipulating a person so that their private information can be obtained is known as…
- Phishing
- Social engineering
- Malware
- Hashing
How can a business reduce the risk of employees becoming victims of phishing or blagging scams?
- A stronger firewall
- Staff training
- Stronger passwords
- Removal of USB ports
An untargetted scam message asking for help, randomly sent to many recipients, is a ______ scam.
- Phishing
- Authorisation
- Blagging
- Adware