1
A man-in-the-middle (MITM) attack involves one actor positioning itself between a party to intercept and use data maliciously.
True
False
2
Is the Honeypot technique intended to deflect hackers?
False
True
3
A Data Breach attack occurs when a hacker successfully attacks a company.
False
True
4
What does a Firewall do?
monitors outgoing traffic
monitors incoming traffic
monitors incoming and outgoing traffic
none of the alternatives
5
Which term is short for "malicious software"?
Malware
None of the dealternatives.
Spyware
Firewall
6
The word "botnet" is a combination of which words?
Network and autobot
Internet and autobot
Internet and robot
Network and robot