#1
Which of the following is NOT a common social engineering technique?
#2
What does 'HTTPS' stand for in the context of web browsing?
#3
What is the purpose of a firewall in network security?
#4
What is the primary purpose of a VPN (Virtual Private Network)?
#5
What is the difference between a virus and a worm in the context of computer security?
#6
Which of the following is an example of two-factor authentication?
#7
What does 'SQL injection' refer to in cybersecurity?
#8
What does 'GDPR' stand for in the context of data protection?
#9
Which of the following is a common method to secure wireless networks?
#10
Which of the following is an example of physical security?
#11
Which of the following best describes the term 'zero-day vulnerability'?
#12
What is the purpose of an Intrusion Detection System (IDS)?
#13
What is the purpose of a security policy in an organization?
#14