Select 3 different types of Hacking from the list below
Black Hat Hacking
White Hat Hacking
Blue Hat Hacking
Grey Hat Hacking
Orange Hat Hacking
Pink Hat Hacking
Which type of Hacking from your answers is legal?
Is it necessary to spend money on protecting data and information
Data is threatened by many different kinds of attack such as or .
Choose the correct answer from the list below
Viruses can begin to release payloads without a trigger
Malware is free software designed to help people to use their PC more efficiently
Botnets are a network of PC systems all being controlled by one Master system
Passwords can only be used on a payment subscription service
You can access a PC by logging in using the correct username and password for an account
Select the 2 correct answers
Social Engineering is a physical threat to data, not usually performed within a PC itself
Malware is readily available for anyone to access at any time
Data is a useless commodity with unexplained value
Phishing is a scam involving your local supermarket