Quiz 1.4: Network Security
Why might a person or organisation create malicious software?
What is the name of the technique that involves sending deceptive emails to trick users into revealing personal information?
Which type of attack typically uses a botnet?
Which type of malware initially appears to be a useful application, but installs additional malware?
What is the name of the attack that involves inserting malicious code into a database query?
Which of the following is not a method of protection from a man-in-the-middle attack?
Listening-in to communications between two devices is known as…
Manipulating a person so that their private information can be obtained is known as…
How can a business reduce the risk of employees becoming victims of phishing or blagging scams?
An untargetted scam message asking for help, randomly sent to many recipients, is a ______ scam.