3 items

    Hacks Uncovered

    Test your knowledge on various hacking techniques and how to protect against them.

    Which of the following is a common method used by hackers to gain unauthorized access?

    What is the primary goal of a DDoS attack?

    What is phishing?