A memory stick, loaded with malware, is purposely left for a victim to find and use. This is known as…
- Baiting
- Phishing
- SQL injection
- Trojan horse
Which category of "hacker" breaks into a system without the owners permission, hoping to collect a reward for finding vulnerabilities?
- White hat
- Grey hat
- Black hat
- Red hat
Which type of malware shows unwanted adverts?
- Adware
- Ransomware
- Spyware
- Trojan horse
Which category of "hacker" breaks into a system without the owners permission, to steal or damage information?
- White hat
- Grey hat
- Black hat
- Red hat
What is the term for the process of converting data into an unreadable form to prevent unauthorised access?
- Malware
- Firewall
- Antivirus
- Encryption
What is the term for the physical or logical arrangement of devices on a network?
- Network policy
- Network topology
- Network protocol
- Network security
Which category of "hacker" breaks into a system with the owners permission?
- White hat
- Grey hat
- Black hat
- Red hat
What is the name of the attack that involves flooding a target with network traffic to make it inaccessible?
- Phishing
- Brute force
- Denial of service
- SQL injection
Manipulating a person so that their private information can be obtained is known as…
- Phishing
- Social engineering
- Malware
- Hashing
Which of the following could be used as an SQL injection?
- SELECT * FROM users WHERE username = 'admin' AND password = 'pass123';
- INSERT INTO accounts (username, password) VALUES ('user1', 'password123');
- UPDATE products SET price = price * 1.1 WHERE category = 'Electronics';
- SELECT * FROM products WHERE id = 1 OR 1=1;