81. What is spear phishing?
a. A type of phishing attack that targets a specific individual or group.
b. A type of phishing attack that targets a wide range of individuals.
c. A type of phishing attack that uses voice communication to trick individuals.
d. None of the above.
82. What is whale phishing?
a. A type of phishing attack that targets high-profile individuals such as CEOs or executives.
b. A type of phishing attack that targets a wide range of individuals.
c. A type of phishing attack that uses voice communication to trick individuals.
d. None of the above.
83. What is vishing?
a. A type of phishing attack that uses voice communication to trick individuals.
b. A type of phishing attack that targets a wide range of individuals.
c. A type of phishing attack that targets high-profile individuals such as CEOs or executives.
d. None of the above.
84. What is smishing?
a. A type of phishing attack that uses SMS or text messages to trick individuals.
b. A type of phishing attack that targets high-profile individuals such as CEOs or executives.
c. A type of phishing attack that targets a wide range of individuals.
d. None of the above.
85. Which of the following is a common phishing technique?
a. Spoofing
b. Cross-site scripting
c. SQL injection
d. None of the above.
86. What is spoofing?
a. A technique used in phishing attacks to make the attacker’s email or message appear as if it is coming from a legitimate source.
b. A technique used to inject malicious code into a website.
c. A technique used to extract sensitive information from a database.
d. None of the above.
87. What is whaling?
a. A type of phishing attack that targets high-profile individuals such as CEOs or executives.
b. A type of phishing attack that targets a wide range of individuals.
c. A type of phishing attack that uses voice communication to trick individuals.
d. None of the above.
88. Which of the following is a common defense against phishing attacks?
a. Employee education and training
b. Two-factor authentication
c. Anti-phishing software
d. All of the above
89. Which of the following is a social engineering attack that involves sending fraudulent emails or messages to trick individuals into revealing sensitive information or performing actions that can compromise their security?
a. Hacking
b. Spoofing
c. Phishing
d. None of the above
90. What is hacking?
a. The act of exploiting vulnerabilities in a system or network to gain unauthorized access or control.
b. The act of making fraudulent phone calls to trick individuals into revealing sensitive information.
c. The act of sending fraudulent emails or messages to trick individuals into revealing sensitive information or performing actions that can compromise their security.
d. None of the above.