Which of these groups exploit vulnerabilities?
A. Goverments
B. Criminals
C. Hacktivists
D. All Of The Above
What is a group of computers networked together and used by hackers to steal information called?
A. Rootkit
B. Operating System
C. Botnet
D. DDoS
What type of software infects a machine, locks the files, then asks for money?
A. Worm
B. Trojan
C. Ransomware
D. Browser Hijacker
What is getting connected to a system without a username or password called?
A. Null Session
B. Blank Session
C. Admin Session
D. Bot Session
What type of attack grew significantly in 2016?
A. Phishing
B. ClickJacking
C. SQL Injection
D. Ransomware
What is a computer network?
A. Internet Service Provider
B. A Quantum Computer
C. Computer/Devices That Are Connected Together
D. Fiber Optic Cables
What is a worm that affects SQL servers?
A. SQL Slammer
B. Storm Worm
C. SQL Michelangelo
D. The Great Worm
What does the acronym AES stand for?
A. Automated Encryption Strength
B. Advanced Encryption Standard
C. Algorithm Encrypted System
D. Advanced Encryption Solution
Which command can be used in DOS or Windows command Prompt to hide files?
A. Stealth [file/ directory]
B. Attrib +h [ file / directory]
C. Hide –h [file/ directory]
D. Attrib *h [ file / directory]
Which company gave away more than £1 million in the last year in security bug bounties?
A. Facebook
B. Google
C. Yahoo
D. Apple
Oops! You need to select an answer to continue.