• 1. 
    The main advantage of asymmetric cryptography is that it offers better security because it uses two different keys.

  • True
  • False
  • 2. 
    Which of the following refers to someone who has a conviction?

  • Someone who has committed a crime
  • Someone who witnessed a crime
  • Someone who has been found guilty of a crime
  • Someone who is caught in the act of committing a crime
  • 3. 
    The "A" in the CIA triad stands for

  • Accessibility
  • Advantage
  • Availability
  • Both A & B
  • 4. 
    What type of things can be classed as computer misuse?

  • Looking at personal emails during work time
  • Sending a joke on the work email to everyone in the system
  • Using another member of staffs PC when they have left it unlocked
  • Using a work computer to buy personal items
  • 5. 
    What does GDPR stand for?

  • Great Danes Performance Ratings
  • General Data Protection Records
  • General Disclosure Protection Regulations
  • General Data Protection Regulation
  • 6. 
    Hackers who engage in hacking for illegal purposes are known as which of the following?

  • Red hat hacker
  • Black hat hacker
  • Blue hat hacker
  • White hat hacker
  • 7. 
    Having a password that consists of a combination of letters, both uppercase and lowercase, numbers and symbols is known as which of the following?

  • Secure password
  • Solid password
  • Keylogger password
  • Trojan password
  • 8. 
    Plaintext + key = ______________.

  • Decoded
  • Ciphertext
  • Uncoded
  • 9. 
    This is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.

  • Encryption
  • Conscription
  • Decryption
  • All of above
  • 10. 
    Which one of the following laws extends police powers and grants the home office greater control over operational policing?

  • Police and Justice Act
  • Police and Home Office Act
  • Data Protection Act
  • Data Police Investigation Act
  • 11. 
    The "C" in the CIA triad stands for

  • Communications
  • Compatibility
  • Confidentiality
  • None of these
  • 12. 
    ____________, also known as penetration testing or pen testing, is legally breaking into computers and devices to test an organization's computer security system.

  • Enigma
  • Error Testing
  • Ethical Hacking
  • None of these
  • 13. 
    A group, or string, of random characters in a particular order, used to scramble data to make it private or gibberish to outsiders.

  • Key
  • Lock
  • Anchor
  • All of above
Report Question