Podcast
Questions and Answers
Which one of the following best defines a 'phishing' attack?
Which one of the following best defines a 'phishing' attack?
- A method of hacking into a computer system by exploiting vulnerabilities in software
- A type of malware that encrypts files and demands a ransom for their release
- A type of cyber attack that floods a network with traffic to disrupt its operation
- A technique used to trick individuals into revealing sensitive information like passwords or credit card numbers (correct)
What is the importance of two-factor authentication in cybersecurity?
What is the importance of two-factor authentication in cybersecurity?
- It scans networks for vulnerabilities and prevents unauthorized access
- It monitors and analyzes network traffic to detect and respond to cyber threats
- It encrypts data to protect it from unauthorized access
- It provides an extra layer of security by requiring users to provide two forms of identification to access a system (correct)
What is the role of a Virtual Private Network (VPN) in online privacy?
What is the role of a Virtual Private Network (VPN) in online privacy?
- It encrypts data to protect it from unauthorized access
- It monitors and analyzes network traffic to detect and respond to cyber threats
- It scans networks for vulnerabilities and prevents unauthorized access
- It provides a secure connection between a user's device and the internet (correct)
Flashcards are hidden until you start studying