• 1. 
    A data subject is ...

  • the individual staff member who access and maintains the personal data
  • the person whose personal details are being stored by an organisation
  • 2. 
    What does BIOS stand for?

  • It doesn't stand for anything
  • Basic Input Output System
  • Boots In One Second
  • Basically, I'm the Origin of the System
  • 3. 
    Encryption is...

  • Organisational procedure to keep an electronic copy of important data (either on site or off site).
  • This is the process of encoding a message or information in such a way that only authorised parties can access it.
  • 4. 
    If someone uses your personal information to sign up for a website without your agreement, this is called?

  • Cyberbullying
  • Identity Theft
  • A Prank
  • Phishing
  • 5. 
    What does a virus do?

  • Makes the computer stop working
  • Attaches inside of program
  • Spreads across system
  • Gets full access
  • 6. 
    Implementation of information security often described as combination of _.

  • art and science
  • art and math
  • ethics and math
  • ethics and physics
  • 7. 
    Which of the following information isimportant in protecting client’s data?

  • Health insurance beneficiary numbers
  • Phone numbers
  • Zip codes
  • All of the above
  • 8. 
    What is one way that you can preventidentity theft?

  • Maxing out your credit card
  • Throwing personal documents away withoutshredding them
  • Opening several accounts
  • Examining bank accountson a regular basis
  • 9. 
    What is a worm?

  • A worm you see outside in the dirt.
  • A software used to worm into your computer.
  • Malware that can infect and spread without human assistance.
  • 10. 
    Ransomware is an example of what type of security threat?

  • Internal
  • External
  • Physical
  • 11. 
    Which of the following is referred to as the science of encryption?

  • Cryptography
  • Cryptanalysis
  • Cryptology
  • Cryptocism
  • 12. 
    The _____ type of malware collects personal information and sends it to a third party.

  • Worm
  • Toolbar
  • Homepage hijacker
  • Spyware
  • 13. 
    What is software?

  • Viruses on your computer
  • Programs used by a computer
  • Documents used to type information on
  • Harmful information
  • 14. 
    What is spyware?

  • Malware that collects information about you without your consent or knowledge.
  • A program that looks through you laptop camera and allows your FBI Agent to see you.
  • A program that allows you to become a better spy and gives you tools to spy on your friends.
  • 15. 
    What does 'integrity of data' mean?

  • "Accuracy and completeness of the data"
  • "Data should be viewable at all times"
  • "Data should be access by only the right people"
  • "None of the above"
  • 16. 
    Which refers to a well-informed sense of assurance that the information risks and controls are in balance?

  • Arts
  • Security Artisan
  • Information Security
  • Architecture
  • 17. 
    The _____ type of malware is code attached to another file. The malicious code automatically makes copies of itself and drops its payload when the host file is opened.

  • Virus
  • Worm
  • Keystroke logger
  • Toolbar
  • 18. 
    What kind of cyber security risks can be minimised by using a Virtual Private Network (VPN)?

  • Use of insecure Wi-Fi networks
  • Key-Logging
  • De-anonymization by network operators
  • Phishing attacks
  • 19. 
    The system administrator in your office quits unexpectedly in the middle of the day. it's quickly apparent that he changed the server password and no one knows what is it. what might you do in this type of situation?

  • use a trojan horse to find the password
  • Use a password cracker to find the password
  • use social engineering to find the password
  • delete and reinstall the server
  • 20. 
    What is a firewall?

  • A wall made of fire in your computer to make sure your computer is heated up and running properly.
  • A software used to attack other security measures in your computer to insure your computer is safe.
  • A filter that filters incoming data, protecting a network from attacks.
  • 21. 
    What is Cyber security?

  • All the tools we use and actions we take to keep computers safe.
  • Protecting your computer against hackers
  • Being secure against cyber bots
  • 22. 
    You receive a suspicious email that contains a link to a website. what should you do?

  • Inform IT about the email and do not open it
  • "Click on the link and open it to see where it goes"
  • "Go to the internet explorer and type the link"
  • "Forward it to a colleague and have them open it first"
Report Question