Dubai is located on the coastline of which body of water?
The Persian Gulf
What term describes a system that controls network traffic based on security rules?
Firewall
What is the traditional Arabic coffee served in small cups called?
Gahwa
What type of attack floods a server to make it unavailable?
Denial of Service (DoS) attack
The Dubai Creek, a significant geographical feature, divides Dubai into which two main sections?
Deira and Bur Dubai
What single word describes the act of tricking someone into revealing personal information?
Phishing
What is the name of the traditional wooden boats used for fishing and pearl diving, still seen in Dubai Creek?
Dhows
What is social engineering in cyber attacks?
Human manipulation for data/access.
The artificial islands known as "The Palm Jumeirah" are shaped like what?
A palm tree
What single word describes the process of converting data into a secret code?
Encryption
What is the name of the festival that marks the end of Ramadan?
Eid al-Fitr
What is a botnet?
Network of infected computers.
The Dubai Mall, one of the world's largest shopping malls, is located adjacent to which famous landmark?
Burj Khalifa
Name the three components of the CIA Triad
What is the name of the sweet pastry made with layers of filo dough, nuts, and syrup?
Baklava
What term describes the act of stealing usernames and passwords to gain unauthorized access to accounts?
Credential theft
Which iconic hotel in Dubai is known for its distinctive sail-shaped design?
The Burj Al Arab
What two-word phrase describes a vulnerability unknown to the software vendor?
Zero-day
What is the name of the traditional Emirati dance often performed at celebrations?
Al Ayala
What name is given to malicious code hidden within seemingly harmless files or programs?
Trojan Horse