1.
Which of the following is an example of a web attack?
2.
What is a common technique used in online tech support scams?
3.
What is a common technique used in website spoofing attacks?
4.
What is a common technique used in vishing scams?
5.
What is a common vulnerability in code that can lead to security breaches?
6.
What is information security?
7.
What is a common sign that a website is not secure?
8.
Which of the following is NOT an example of a password policy best practice?
9.
What is a common sign that an online investment opportunity is a scam?
10.
How can you protect yourself from vishing scams?
11.
What is a safe way to browse the web?
12.
What is the primary goal of a web application attack?
13.
. What is the primary purpose of encryption in information security?
14.
What is the best way to prevent web attacks?
15.
What is the purpose of threat modeling in secure coding practices?
16.
Which of the following is NOT an example of a password attack?
17.
What is a common vulnerability in code related to session management?
18.
What is the best way to protect against password attacks?
19.
Which of the following is an example of a social engineering attack?
20.
What is a common technique used by attackers to deliver malware to a user's device?
21.
What is a common characteristic of an online phishing scam?
23.
What is the primary goal of a password policy?
24.
What is the primary purpose of phishing attacks?
25.
How can you protect your web browser from malware?