Guidepad Quiz Welcome To The Guidepad Cyber Security Quiz Guidepad 1 / 3 1. Which of the following best describes the practice of 'phishing' in cybersecurity? A. Securing a network with various layers of protection. B. Sending emails or messages that appear to be from trusted sources to steal sensitive information. C. Encrypting data to protect it from unauthorized access. D. Scanning a network for vulnerabilities using automated tools. 2 / 3 2. When developing software, which of the following practices is essential for ensuring the security of the application? A. Frequently changing the programming language used. B. Limiting the software's functionality to reduce potential vulnerabilities. C. Using only open-source libraries to speed up the development process. D. Conducting regular code reviews and vulnerability assessments. 3 / 3 3. A federal agency's website has been experiencing unusually high traffic, causing slowdowns and outages. This could be an example of: A. A software bug causing performance issues. B. Unauthorized access to the server's administrative functions. C. A Distributed Denial of Service (DDoS) attack aimed at overwhelming the site. D. An insider threat leading to data leakage. Your score is 0% Exit