What is the name of the attack that involves flooding a target with network traffic to make it inaccessible?
- Phishing
- Brute force
- Denial of service
- SQL injection
Why might a person or organisation create malicious software?
- Theft of data
- Blackmail or extortion
- For fun
- All of the above
Listening-in to communications between two devices is known as…
- A man-in-the-middle attack
- Encryption
- Decryption
- Malicious Wi-Fi
How can input validation help protect against SQL injection?
- By encrypting database connections
- By restricting special characters in user input
- By increasing the complexity of SQL queries
- By installing antivirus software
What is the name of the encryption method that uses the same key to encrypt and decrypt data?
- Symmetric encryption
- Asymmetric encryption
- Hashing
- Salting
What is the term for software that is designed to cause harm or damage to a computer system?
- Malware
- Firewall
- Antivirus
- Encryption
A memory stick, loaded with malware, is purposely left for a victim to find and use. This is known as…
- Baiting
- Phishing
- SQL injection
- Trojan horse
What role does input sanitisation play in SQL injection prevention?
- Encrypting database connections
- Removing special characters from user input
- Increasing the complexity of SQL queries
- Granting unlimited database access to users
What is the term for the software that monitors and controls incoming and outgoing network traffic based on predefined rules?
- Malware
- Firewall
- Antivirus
- Encryption
What is the term for the process of converting encrypted data back into its original form?
- Authentication
- Authorisation
- Encryption
- Decryption