Cyber-hacker Protection Test
Of the following, which is a DoS attack?
Correct!
Wrong!
Which of the following best describes a hacker of computers?
Correct!
Wrong!
Which of the following is a phishing example?
Correct!
Wrong!
Which of the following offers the strongest wireless signal encryption?
Correct!
Wrong!
Which of the following remote access protocols is secure?
Correct!
Wrong!
The idea of utilizing the same key for both encryption and decryption is known as .
Correct!
Wrong!
Virtual "listening in" on data exchanged over a WiFi network that is not secure (not encrypted).
Correct!
Wrong!