1.
Which malware is designed to record user input using keyboard keystrokes and can steal credentials?
2.
In which type of phishing attack do attackers use phone calls or voice messages to deceive individuals into revealing sensitive information?
3.
Which cybersecurity challenge tricks users and manipulate them into divulging confidential information?
4.
How Many total/main Domains are there in ISO27001:2022 version?
5.
Which type of cyber threat actor is typically motivated by financial gain and aims to steal sensitive information for monetary purposes?
6.
What is the term for the practice of tricking individuals into revealing sensitive information by pretending to be a trustworthy entity?
7.
What is a common characteristic of a ransomware attack?
8.
In the image below, various cyber security attacks are highlighted with brief descriptions. One attack name has been replaced with a question mark. What is the missing attack name for the highlighted incident?
9.
Explore the realm of malware threats in the image below, where various types are highlighted with brief descriptions. One malware attack has been obscured with a question mark (?). Can you identify the correct name for the concealed malware from the options provided?
10.
Which characteristic is common in most email phishing scams?
11.
Which term refers to individuals who are skilled in using hacking tools but lack in-depth technical knowledge and typically use pre-existing software to conduct attacks?
12.
Which of the following is a common problem associated with weak or reused passwords in cybersecurity?
13.
In a social media phishing scam, what may attackers use to impersonate well-known brands or celebrities to deceive users?
14.
What is a characteristic of ransomware?
15.
Which cyber attack involves exploiting software vulnerabilities to gain unauthorized access or control over a system?
16.
What type of cyber-attack involves the insertion of malicious code into a website to steal data from users who visit the site?
17.
What is a characteristic of a rootkit?
18.
Which type of malware disguises itself as legitimate software but carries a malicious payload?
19.
What is a common method used in social media scams to spread malware or direct users to malicious websites?
20.
What is the best cyber security defense measure that can ensure educating employees about potential security threats and best practices?
21.
When reporting a cyber security incident, it's crucial to provide accurate contact information. In the image below, an email address has been concealed and replaced with a question mark(?). Which of the following options represents the correct email address for reporting cyber security incidents at 101 Digital?
Thank you for the Quiz, Kindly check your email for the result.
Good Luck!