Question 1
Which of the following best describes the concept of an Intrusion Prevention System (IPS)?
Question 2
Which of the following is a key characteristic of a buffer overflow attack?
Question 3
What is the primary purpose of a security policy in cybersecurity?
Question 4
Which of the following best describes a man-in-the-browser attack?
Question 5
What is the primary purpose of a public key in a public key infrastructure (PKI)?