Multi-Factor Authentication (MFA) helps by:
Which of the following is considered “personal data” under GDPR?
The first step in threat modeling is usually:
Threat modeling helps organizations to:
Why should organizations conduct regular risk assessments?
Which of the following is an OWASP Top 10 category?
Which is an example of "Tampering" in STRIDE?
Which of the following is a key component of ISO 27001?
The OWASP Top 10 focuses on:
Security Misconfiguration can occur when:
SQL Injection allows attackers to:
GDPR applies primarily to:
Which of the following is an example of a cyber threat?
ISO 27001 is a standard for:
In threat modeling, a “threat actor” refers to:
ISO 27001 requires organizations to establish an ISMS. ISMS stands for:
A phishing attack typically tries to:
The best defense against social engineering attacks is:
What does GDPR stand for?
Under GDPR, individuals have the right to:
STRIDE is a threat modeling framework. What does the “S” stand for?
Why is Cyber Security important for organizations?