Questions Archives

Question 3 m2 cys

Is the following statement true or false? Hackers can extract information from your website, from social media or professional...

Question 3 m2 cys

Is the following statement true or false? Hackers can extract information from your website, from social media or professional...

Question 2 m2 cys

Phishing can involve a variety of approaches, but which is the most common?

Question 2 m2 cys

Phishing can involve a variety of approaches, but which is the most common?

Question 1 m2 cys

If you want to help identify and deal with cyber-attacks, what is the first action you should take?

Question 1 m2 cys

If you want to help identify and deal with cyber-attacks, what is the first action you should take?

Question 7 m1 cys

Politically-motivated cyber attacks are more likely if your organisation operates in an industry  that experiences political activism, or contains...

Question 7 m1 cys

Politically-motivated cyber attacks are more likely if your organisation operates in an industry  that experiences political activism, or contains...

Question 5 m1 cys

Which 2 of the following reasons could be behind a cyber-attack on a specific individual?

Question 5 m1 cys

Which 2 of the following reasons could be behind a cyber-attack on a specific individual?

Question 3 m1 cys

If a cyber-attack is sponsored by a foreign government, what could be their targets?

Question 3 m1 cys

If a cyber-attack is sponsored by a foreign government, what could be their targets?

Question 2 m1 cys

Is the following statement true or false? A political activist could initiate a cyber-attack to access sensitive information to...

Question 2 m1 cys

Is the following statement true or false? A political activist could initiate a cyber-attack to access sensitive information to...