Which of the following best describes a phishing attack?
Think about scams that use fake emails or websites to steal information.
Phishing attacks use fake messages or websites to trick people into giving away sensitive data like passwords or credit card numbers.
What is the primary effect of ransomware on a victim's computer?
Consider what happens when you cannot open your own files and see a payment demand.
Ransomware locks or encrypts files and demands money to unlock them, disrupting access to important data.
Which of the following scenarios best illustrates a Denial of Service (DoS) attack?
Think about attacks that overwhelm a service to stop it from working.
DoS attacks flood a target with excessive traffic to overload it, causing legitimate users to lose access.
Which statement correctly distinguishes a virus from a worm?
Consider how each type spreads from one computer to another.
Viruses need a user to run or open infected files to spread, whereas worms can spread on their own through networks.
A company employee receives a call from someone claiming to be IT support asking for their login password to fix an urgent issue. What type of cyber threat does this represent?
Think about attacks that use made-up stories to trick people into giving information.
Pretexting involves creating a false scenario to persuade someone to reveal confidential information.