Antivirus software, techniques
Cyberwarfare attacks, cyber weapon
Social engineering
Encryption
100

What is antivirus software?

Antivirus software is a type of utility software that looks for and eliminates viruses, Trojans, worms, and other malware.

100

What is a social engineer?

A social engineer is a person who devises and carries out an exploit, using deceptive practices to manipulate individuals into providing sensitive information or access.

100

What is Spear Phishing?

A targeted phishing attack aimed at specific individuals or organizations. Attackers conduct research to personalize their messages and make them more convincing.

100

 Name two types of encryption

Two common types of encryption are symmetric encryption and asymmetric encryption.

200

Which devices can be protected by antivirus software?

Antivirus software is available for all types of computers and data storage devices, including smartphones, tablets, personal computers, USB flash drives, servers, PCs, and Macs.

200

How do social engineering attacks exploit human vulnerabilities?

Social engineering attacks prey on human vulnerabilities such as gullibility, curiosity, and greed, using incentives to compel individuals to participate in the scam.

200

What are the key differences between phishing, vishing, and smishing?

Phishing uses emails that appear to be from legitimate sources to trick people into revealing sensitive information.

Vishing employs phone calls and voice messages to deceive individuals into sharing personal data or taking certain actions.

Smishing relies on text messages (SMS) containing malicious links or requests for personal information to exploit victims.

200

What symmetric encryption means?

Symmetric encryption is a method of encryption where the same key is used for both encryption and decryption of the data. In other words, the sender and the receiver both use the same secret key to both encrypt and decrypt messages.

300

Can you name some popular antivirus programs?

Some popular antivirus programs include Norton AntiVirus, Kaspersky Anti-Virus, F-Secure Anti-Virus, Windows Defender, and Avast.

300

What are the risks associated with the presence of cyber weapons in cyberspace?

The presence of cyber weapons in cyberspace could lead to reverse engineering of their source code, allowing ill-intentioned individuals to design and spread new cyber threats.

300

What are some effective protection techniques against vishing?

Don't pick up calls from unknown numbers; verify the caller's identity before engaging in conversation. The moment you suspect it's a fraudulent phone call, don't feel obliged to carry on a polite conversation. Simply hang up and block the number.

300

Decrypt the word 'eqpxgtvkpi' using the Caesar cipher

converting

400

What is a virus signature and how is it used to combat malware?

A virus signature is a unique sequence of instructions in malware code. Antivirus software uses virus signatures to identify and remove malware.

400

How many countries are currently engaged in the development of offensive cyber warfare capability?

Nearly 140 countries in the world are engaged in the development of offensive cyber warfare capability.

400

What are some effective protection techniques against phishing?

Be cautious about all messages you receive. Don't enter personal information in a pop-up screen. Don't click on any links listed in the email message.

400

How does encryption help protect online privacy?

Encryption helps protect your online privacy by turning personal information into “for your eyes only” messages intended only for the parties that need them and no one else. You should make sure that your emails are being sent over an encrypted connection, or that you are encrypting each message.

M
e
n
u