• 1. 
    To keep your browser private, you can use the _______ mode.

  • incognito
  • confidential
  • encrypted
  • deception
  • 2. 
    Which is NOT a type of malware?

  • Virus
  • Worm
  • Trojan horse
  • Sandwich
  • 3. 
    What should you look out for when reading emails

  • All of above
  • Poor spelling and grammar
  • Sender's email
  • Request for personal information
  • 4. 
    Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access

  • True
  • False
  • 5. 
    Some websites have “http://” extension while some have “https://”What does the ‘s’ mean?

  • That the data entered on the website is secure and encrypted.
  • It’s a special website.
  • That it’s the latest version of the site.
  • Its being loaded in a simple format.
  • 6. 
    ______________ is way of protecting internet-connected systems, including: hardware, software and data, from cyberattacks

  • Cyber Security
  • Cyber Safe
  • SPAM
  • DDOS
  • 7. 
    How did the reporters gain access to peoples voicemail in mobile phone hacking scandal in 2012?

  • They spoke to the victoms
  • They hacked their computers
  • They tried using the default PIN number which was frequently unchanged
  • They used white box testing
  • 8. 
    Which of these is not a form of phishing

  • fake email
  • fake website link
  • spam
  • key logger
  • 9. 
    Whats encryption?

  • Passing text thorough a maths algorithm to scramble text
  • Changing the letters by a set number (Caesar Cipher)
  • Changing to ASCII code
  • Converting text to hex
  • 10. 
    Which of the following are activities that a hacker might attempt?

  • Stealing usernames and passwords
  • Modifying website content
  • Disrupting network communications
  • All of the above
  • 11. 
    Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe?

  • True
  • False
  • 12. 
    Qwerty123 is a Strong Password (i.e. not a cyber security risk)

  • True
  • False
  • 13. 
    Viruses, worms, and trojans are common security threats that are often used in spreading. What is the name for them all?

  • Malware
  • Formalware
  • Scams
  • The Spreading attackers
  • 14. 
    Which one of the following is NOT a security threat?

  • Worms
  • Hacking
  • Anti-Virus
  • Pharming
  • 15. 
    What is a keylogger?

  • Malware that locks your files until you pay the hacker to unlock them
  • Code that will run a malicious function if certain functions are met
  • Malware that steals senstive information.
  • A device / program that records the keys pressed.
  • 16. 
    How does malware get onto your computer?

  • Email attachments or links
  • By visiting dodgy websites
  • On USB sticks
  • All of the above
  • 17. 
    What type of program can you install to prevent malware?

  • Antivirus software
  • Office software
  • A new operating system
  • A disk defragmenter
  • 18. 
    What is blagging?

  • Observing a person's private info over their shoulder
  • Cyber attack to redirect a website's traffic to another, fake site
  • Inventing a scenario to target someone into divulging information
  • A virus that registers key strokes
  • 19. 
    Which one of the following is NOT a type of CyberSecurity Attack?

  • Worms
  • Randsomware
  • Spyware
  • Password Management
  • 20. 
    Detecting Vulnerabilities in a computer system/network also includes employee behaviours and procedures?

  • True
  • False
Report Question
warning
access_time
  Time