Exercise

  1. What are the malicious softwares, DDos and exploits?
  2. What is the BYOD?
  3. Write a short note on the penetration test.
  4. What are the botnet and phishing?
  5. Who are the black hat hackers?
  6. Who are the hacktivists?
  7. Who are the white hat hackers?
  8. Who are the Script Kiddies?
  9. Write the motivations of bad actors.
  10. What is the purpose of a cyberattack on the healthcare sector?
  11. What is the motivation of a cyberattack on the education sector?
  12. What are the targeted and untargeted cyber attacks?
  13. Write the stages of cyberattacks.
  14. How malware and phishing attacks occur?