What's the purpose of Multi-Factor Authentication?
Phishing can involve a variety of approaches, but which is the most common?
If you want to help identify and deal with cyber-attacks, what is the first action you should take?
Which 2 of the following reasons could be behind a cyber-attack on a specific individual?
If a cyber-attack is sponsored by a foreign government, what could be their targets?