MODULE 2: CYBER ATTACKS

Explore how attacks actually happen: phishing and BEC, OSINT and social engineering, trojans and ransomware, DDoS disruption, insider threats, and immediate response steps.

INTERMEDIATE LEVEL
10:00
Question 1 of 10

Ready to Explore Cyber Attacks?

This quiz contains 12 multiple-choice questions based on Module 2. You have 12 minutes to complete it. Good luck!

Question 1

QUIZ RESULTS

You scored 0 out of 12 correct!