Multi-Factor Authentication (MFA) helps by:
SQL Injection allows attackers to:
Security Misconfiguration can occur when:
Which of the following is an example of a cyber threat?
GDPR applies primarily to:
Which of the following is a key component of ISO 27001?
The first step in threat modeling is usually:
Threat modeling helps organizations to:
A phishing attack typically tries to:
ISO 27001 is a standard for:
What does GDPR stand for?
In threat modeling, a “threat actor” refers to:
Under GDPR, individuals have the right to:
STRIDE is a threat modeling framework. What does the “S” stand for?
Which is an example of "Tampering" in STRIDE?
Which of the following is considered “personal data” under GDPR?
Why should organizations conduct regular risk assessments?
Which of the following is an OWASP Top 10 category?
The OWASP Top 10 focuses on:
The best defense against social engineering attacks is:
Why is Cyber Security important for organizations?
ISO 27001 requires organizations to establish an ISMS. ISMS stands for: