Which of the following is not a method of protection from a man-in-the-middle attack?
- Avoiding unfamiliar Wi-Fi hotspots
- Encrypting communication
- Using a VPN
- Using strong passwords
What is the name of the attack that involves repeatedly trying different passwords until the correct one is found?
- Phishing
- Brute force
- Denial of service
- SQL injection
Which type of malware initially appears to be a useful application, but installs additional malware?
- Adware
- Ransomware
- Spyware
- Trojan horse
Which type of malware spreads by attaching itself to other programs?
What is the name of the encryption method that uses a pair of keys (public and private) to encrypt and decrypt data?
- Symmetric encryption
- Asymmetric encryption
- Hashing
- Salting
Which category of "hacker" is acting legally?
- White hat
- Grey hat
- Black hat
- Red hat
What is the name of the protocol that allows files to be securely transferred between computers over a network?
What is the term for the process of converting encrypted data back into its original form?
- Authentication
- Authorisation
- Encryption
- Decryption
Which type of attack typically uses a botnet?
- Distributed denial of service
- Denial of service
- SQL injection
- Brute force
How can a system be protected against a denial-of-service attack?
- Packet filters on routers
- Using a VPN
- Stronger passwords
- Using a star network topology