Which of the following is a physical prevention method?
- Locking the computer room door
- Logging-out
- Using a firewall
- Installing anti-virus software
What is the name of the attack that involves flooding a target with network traffic to make it inaccessible?
- Phishing
- Brute force
- Denial of service
- SQL injection
The weakest link in any system is the…
- Firewall
- Password
- USB port
- User
A memory stick, loaded with malware, is purposely left for a victim to find and use. This is known as…
- Baiting
- Phishing
- SQL injection
- Trojan horse
What is the name of the protocol that allows files to be securely transferred between computers over a network?
What are infected computers participating in a botnet typically referred to as?
- Monsters
- Ghosts
- Zombies
- Phreaks
What is the term for the process of verifying the identity of a user or device?
- Authentication
- Authorisation
- Encryption
- Decryption
An untargetted scam message asking for help, randomly sent to many recipients, is a ______ scam.
- Phishing
- Authorisation
- Blagging
- Adware
Which type of attack typically uses a botnet?
- Distributed denial of service
- Denial of service
- SQL injection
- Brute force
Which of the following is not a method of protection from a man-in-the-middle attack?
- Avoiding unfamiliar Wi-Fi hotspots
- Encrypting communication
- Using a VPN
- Using strong passwords