A fraud case involved creating multiple fake accounts using bots on a social media platform. Which cybersecurity technique can most effectively reduce automated bot attacks?
A tech graduate leads a cybercrime ring targeting job seekers by impersonating government officials and asking for personal details. What vulnerability are they exploiting?
You suspect unauthorized access to a bank’s network. Which reconnaissance technique would most likely be used to determine open ports in this scenario?
A hacker intercepts login sessions on unsecured public Wi-Fi to steal credentials. Which type of attack is this?
An AI-driven security system blocks suspicious connections automatically. Which concept is this based on?
Fraudsters use a fake website that resembles a legitimate travel booking platform to trap users. What initial security check can users perform to verify website authenticity?
In a recent case, fraudsters posed as telecom representatives, urging victims to download remote-access apps to “improve connectivity.” What’s the key lesson for preventing similar scams?
In detecting online fraud, which AI-powered approach could best identify unusual patterns in account activity, flagging it for review?
An online shopping platform experienced a data breach through SQL Injection. Which primary security flaw likely allowed the breach?
A bank is vulnerable to SQL injection due to poorly structured input validation. Which is the best way to reduce the risk of this vulnerability?
A retired individual is targeted by ransomware demanding payment to regain access to files. What’s a preventive measure to protect data against ransomware?
A retired official was recently scammed by fraudsters posing as law enforcement, asking for money to “clear his name.” What tactic is being used here?
A cyber attacker uses a “brute-force” approach to access a protected system. Which defensive measure is best suited to counteract this?
An AI tool used in cybersecurity flags patterns but struggles with new attacks. What’s the best approach to keep it effective?
AI is often used to predict and prevent phishing attacks. Which feature of AI enables it to differentiate between legitimate and fake emails effectively?
A telecom fraud involves fake app installations. Which step can users take to ensure downloaded apps are legitimate?
A ransomware variant installs a rootkit to evade detection. Which characteristic best describes a rootkit’s purpose?
A high-level government official’s family receives a call asking for account information under the pretense of ‘updating details.’ What should their response be to avoid falling for a scam?
Which technique best describes a scenario where attackers research their target’s public information on social media to create a believable phishing email?
Which of the following is a proactive approach for analyzing cyber threats based on past incidents, like the ones reported in recent fraud cases?