A cyber attacker uses a “brute-force” approach to access a protected system. Which defensive measure is best suited to counteract this?
AI is often used to predict and prevent phishing attacks. Which feature of AI enables it to differentiate between legitimate and fake emails effectively?
A retired individual is targeted by ransomware demanding payment to regain access to files. What’s a preventive measure to protect data against ransomware?
You suspect unauthorized access to a bank’s network. Which reconnaissance technique would most likely be used to determine open ports in this scenario?
Fraudsters use a fake website that resembles a legitimate travel booking platform to trap users. What initial security check can users perform to verify website authenticity?
A ransomware variant installs a rootkit to evade detection. Which characteristic best describes a rootkit’s purpose?
A fraud case involved creating multiple fake accounts using bots on a social media platform. Which cybersecurity technique can most effectively reduce automated bot attacks?
A hacker intercepts login sessions on unsecured public Wi-Fi to steal credentials. Which type of attack is this?
An AI tool used in cybersecurity flags patterns but struggles with new attacks. What’s the best approach to keep it effective?
An online shopping platform experienced a data breach through SQL Injection. Which primary security flaw likely allowed the breach?
A bank is vulnerable to SQL injection due to poorly structured input validation. Which is the best way to reduce the risk of this vulnerability?
A retired official was recently scammed by fraudsters posing as law enforcement, asking for money to “clear his name.” What tactic is being used here?
In detecting online fraud, which AI-powered approach could best identify unusual patterns in account activity, flagging it for review?
An AI-driven security system blocks suspicious connections automatically. Which concept is this based on?
A telecom fraud involves fake app installations. Which step can users take to ensure downloaded apps are legitimate?
In a recent case, fraudsters posed as telecom representatives, urging victims to download remote-access apps to “improve connectivity.” What’s the key lesson for preventing similar scams?
Which technique best describes a scenario where attackers research their target’s public information on social media to create a believable phishing email?
A high-level government official’s family receives a call asking for account information under the pretense of ‘updating details.’ What should their response be to avoid falling for a scam?
A tech graduate leads a cybercrime ring targeting job seekers by impersonating government officials and asking for personal details. What vulnerability are they exploiting?
Which of the following is a proactive approach for analyzing cyber threats based on past incidents, like the ones reported in recent fraud cases?