Which of the following are forms of network attack?
Active, re-active and internal
Active, internal and extreme
Active, passive and external
Which of the following are types of malware?
Worms, Trojans and hackers
Spyware, firewalls and ransomware
Worms, Trojans and ransomware
Which type of threat uses emails to try to trick users into giving away personal details?
Phishing
Brute force
Data interception
Which type of threat is a technique that tries all combinations of characters to try to crack a password?
Which preventative measure probes for weaknesses in a network?
Network policies
Network forensics
Penetration testing
Which preventative measure monitors traffic on a network?
Which of the following tools stops unauthorised traffic from entering and leaving a network?
Anti-malware
Firewall
Which of the following is a threat which may cause a database to give unintended results?
structured query language (SQL) rejection
structured query language (SQL) injection
Which type of threat attempts to force a server offline by bombarding it with requests?
Denial of service (DOS)
Which type of threat attempts to blackmail a user into making a payment to a hacker?
Trojan
Spyware
Ransomware