1.
What is a characteristic of ransomware?
2.
In a social media phishing scam, what may attackers use to impersonate well-known brands or celebrities to deceive users?
3.
When reporting a cyber security incident, it's crucial to provide accurate contact information. In the image below, an email address has been concealed and replaced with a question mark(?). Which of the following options represents the correct email address for reporting cyber security incidents at 101 Digital?
4.
Which type of malware disguises itself as legitimate software but carries a malicious payload?
5.
What type of cyber-attack involves the insertion of malicious code into a website to steal data from users who visit the site?
6.
What is a common characteristic of a ransomware attack?
7.
In which type of phishing attack do attackers use phone calls or voice messages to deceive individuals into revealing sensitive information?
8.
What is the term for the practice of tricking individuals into revealing sensitive information by pretending to be a trustworthy entity?
9.
Which type of cyber threat actor is typically motivated by financial gain and aims to steal sensitive information for monetary purposes?
10.
What is the best cyber security defense measure that can ensure educating employees about potential security threats and best practices?
11.
Which cybersecurity challenge tricks users and manipulate them into divulging confidential information?
12.
Which of the following is a common problem associated with weak or reused passwords in cybersecurity?
13.
What is a common method used in social media scams to spread malware or direct users to malicious websites?
14.
Which characteristic is common in most email phishing scams?
15.
Which malware is designed to record user input using keyboard keystrokes and can steal credentials?
16.
How Many total/main Domains are there in ISO27001:2022 version?
17.
What is a characteristic of a rootkit?
18.
Which term refers to individuals who are skilled in using hacking tools but lack in-depth technical knowledge and typically use pre-existing software to conduct attacks?
19.
Explore the realm of malware threats in the image below, where various types are highlighted with brief descriptions. One malware attack has been obscured with a question mark (?). Can you identify the correct name for the concealed malware from the options provided?
20.
In the image below, various cyber security attacks are highlighted with brief descriptions. One attack name has been replaced with a question mark. What is the missing attack name for the highlighted incident?
21.
Which cyber attack involves exploiting software vulnerabilities to gain unauthorized access or control over a system?
Thank you for the Quiz, Kindly check your email for the result.
Good Luck!