• 1. 
    The main advantage of asymmetric cryptography is that it offers better security because it uses two different keys.

  • True
  • False
  • 2. 
    Create single or multiple files, view contents of a file

  • cd
  • cat
  • chmod
  • xdg-open
  • 3. 
    Vulnerability without a patch

  • PII
  • Zero Day
  • Hack Value
  • Daisy Chaining
  • 4. 
    A watering hole attack is when an attacker will typically what?

  • Target websites associated with water companies
  • Target drinks companies
  • Infect websites visited by the target victims or particular groups
  • Infect a user's computer directly
  • 5. 
    Which of these backups will take the longest to complete?

  • full backup
  • differential backup
  • incremental backup
  • 6. 
    The Copyright, Designs and Patents Act 1988 is designed to protect all types of IP. What does IP stand for?

  • Individual Patents
  • Intellectual Patents
  • Individual Property
  • Intellectual Property
  • 7. 
    A Dictionary Attack is what?

  • Throwing dictionaries at a person
  • Using all the words in the Collins English Dictionary to guess passwords
  • Using a compiled list of common passwords with software to try them all
  • Trying all possible passwords
  • 8. 
    Which of these is traditionally known as an Ethical Hacker?

  • White hat hacker
  • Grey hat hacker
  • Black hat hacker
  • 9. 
    NAC helps with mitigation of Zero-day attacks

  • True
  • False
  • 10. 
    The Internet of Things will connect inanimate objects to the network with intelligent sensors.

  • True
  • False
  • 11. 
    This command executes a sequence of commands that target a specific vulnerability found in a system or application?

  • Exploit
  • Overflow
  • Injection
  • Options
  • 12. 
    The Police and Justice Act 2006 modifies what other Act of Parliament?

  • Data Protection Act 1998
  • Copyright, Design and Patents Act 1988
  • Computer Misuse Act 1990
  • Regulation of Investigatory Powers Act 2000
  • 13. 
    Are smartphones classed as IoT

  • True
  • False
  • 14. 
    When a flaw in a computer system is fixed this is called a _________.

  • Patch
  • buggy
  • Both A & B
  • None of these
  • 15. 
    In computing, unencrypted data is also known as ________.

  • Ciphertext
  • Plaintext
  • Encrypted text
  • Both A & B
  • 16. 
    What is the most basic form of defence against a cyber attack that stops unusual network connections?

  • Antivirus
  • Encryption
  • Firewalls
  • Passwords
Report Question
warning
access_time
  Time