Which of the following is a proactive approach for analyzing cyber threats based on past incidents, like the ones reported in recent fraud cases?
A retired official was recently scammed by fraudsters posing as law enforcement, asking for money to “clear his name.” What tactic is being used here?
Why is it important to keep your software updated?
In a recent case, fraudsters posed as telecom representatives, urging victims to download remote-access apps to “improve connectivity.” What’s the key lesson for preventing similar scams?
An AI tool used in cybersecurity flags patterns but struggles with new attacks. What’s the best approach to keep it effective?
An online shopping platform experienced a data breach through SQL Injection. Which primary security flaw likely allowed the breach?
Which of the following is a good password practice?
What is two-factor authentication?
A hacker intercepts login sessions on unsecured public Wi-Fi to steal credentials. Which type of attack is this?
Which of these devices could be a target for hackers?
If your computer is behaving strangely and slowing down, what might be the cause?
A tech graduate leads a cybercrime ring targeting job seekers by impersonating government officials and asking for personal details. What vulnerability are they exploiting?
AI is often used to predict and prevent phishing attacks. Which feature of AI enables it to differentiate between legitimate and fake emails effectively?
A telecom fraud involves fake app installations. Which step can users take to ensure downloaded apps are legitimate?
Fraudsters use a fake website that resembles a legitimate travel booking platform to trap users. What initial security check can users perform to verify website authenticity?