Podcast
Questions and Answers
What practice involves tricking Internet users into revealing personal or confidential information illicitly?
What practice involves tricking Internet users into revealing personal or confidential information illicitly?
- Phishing (correct)
- Data Breach
- Cryptojacking
- Cyberespionage
Which type of cyber threat involves intrusive software developed to steal data and damage computers?
Which type of cyber threat involves intrusive software developed to steal data and damage computers?
- Botnets
- Malware (correct)
- Web Application
- Spam
What is the term for any unwanted, unsolicited digital communication sent out in bulk?
What is the term for any unwanted, unsolicited digital communication sent out in bulk?
- Spam (correct)
- DDoS
- Cyberespionage
- Botnets
What refers to any intrusive software developed by cybercriminals to steal data and damage or destroy computers and computer systems?
What refers to any intrusive software developed by cybercriminals to steal data and damage or destroy computers and computer systems?
Which of the following is NOT a type of cyber threat?
Which of the following is NOT a type of cyber threat?
What is any attempt by a malicious actor to compromise the security of a Web-based application?
What is any attempt by a malicious actor to compromise the security of a Web-based application?
What is the practice of protecting systems, networks, and programs from digital attacks?
What is the practice of protecting systems, networks, and programs from digital attacks?
What does Steinberg (2020) define Cybersecurity as?
What does Steinberg (2020) define Cybersecurity as?
According to CISCO.com, what is the main aim of cyber attacks?
According to CISCO.com, what is the main aim of cyber attacks?
What did the ENISA Threat Landscape (ETL) 2020 report provide insights into?
What did the ENISA Threat Landscape (ETL) 2020 report provide insights into?