How many capital city’s South Africa has?
3
What term describes a system that controls network traffic based on security rules?
Firewall
What is the focus of the 24th of September holiday?
Cultural Heritage
What type of attack floods a server to make it unavailable?
Denial of Service (DoS) attack
Which is biggest city in South Africa
Johannesburg
What single word describes the act of tricking someone into revealing personal information?
Phishing
What cooking method defines a "Braai"?
barbecue or grill
What is social engineering in cyber attacks?
Human manipulation for data/access.
Which mineral resources South Africa has the most?
Gold & Diamond
What single word describes the process of converting data into a secret code?
Encryption
What beverages is South Africa famous for producing?
Cape wine & Beers
What is a botnet?
Network of infected computers.
Which Language is the most spoken in South Africa?
isiZulu
Name the three components of the CIA Triad
What is the National Sport Of South Africa?
Rugby
What term describes the act of stealing usernames and passwords to gain unauthorized access to accounts?
Credential theft
What mountain overlooks Cape Town?
Table Mountain.
What two-word phrase describes a vulnerability unknown to the software vendor?
Zero-day
What is the name of South Africa's national rugby team?
Springboks
hat name is given to malicious code hidden within seemingly harmless files or programs?
Trojan Horse