#2. 2. Which of the following is a common characteristic of phishing emails?
#3. 3. What is pretexting?
#4. 4. Which of the following is a social engineering technique involving creating a fake online presence to deceive individuals?
#5. 5. What is vishing?
#6. 6. What is ransomware?
#7. 7. Which type of fraud involves redirecting website traffic to a fraudulent site without the user's knowledge?
#8. 8. What is the purpose of a CAPTCHA?
#9. 9. What is a keylogger?
#10. 10. What is the primary goal of a man-in-the-middle (MitM) attack?
#11. 11. What is spear phishing?
#12. 12. What is the purpose of a firewall in the context of internet security?
#13. 13. What is two-factor authentication (2FA)?
#14. 14. What is the term for creating a fake website that imitates a legitimate one to deceive users?
#15. 15. What is the primary purpose of a VPN (Virtual Private Network)?
#16. 16. Which of the following is an example of a physical security measure to prevent fraud?
#17. 17. What is the term for a fraudulent email claiming to be from a trustworthy source in order to trick individuals into revealing personal information?
#18. 18. What is the purpose of end-to-end encryption?
#19. 19. What is social engineering?
#20. 21. What is a security token?
#21. 22. Which type of attack involves flooding a network with traffic to make it unavailable to users?
#22. 23. What is the term for creating a fake email address to deceive individuals?
#23. 24. What is the purpose of antivirus software?
#24. 25. What is the term for the unauthorized access and use of someone else's information or accounts?
#25. 26. What is the term for a security measure that requires users to prove their identity through unique biological characteristics?
#26. 27. What is the purpose of secure sockets layer (SSL) or transport layer security (TLS)?
#27. 28. What is the term for a fraudulent phone call that uses social engineering to manipulate individuals into providing sensitive information?
#28. 29. What is the term for a security measure that uses a combination of letters, numbers, and symbols to protect information?
#29. 30. What is the purpose of a security audit in the context of fraud prevention?