Preview

06 - Practice Test

 1. They are side effects of the freedom and ease of communicating online and therefore…

  None of the above

  it is likely that cyber vulnerabilities will be eliminated in the next two years

  it is unlikely cyber vulnerabilities will ever completely go away

  it is likely that the government will ban the internet from all homes and return it to government-only use

 2. An example of social engineering is:

  Worms

  Trojan Horses

  Telephone IVR Phishing

  Viruses

 3. A example of a network policy that may help with security is:

  Virus

  Phishing

  Acceptable Use Policy

  Data Theft

 4. Malware is a manufacturer of corrupt (but cheap) computer parts

  TRUE

  FALSE

 5. Viruses

  are transferred from monkeys and genetically engineered to make them harmful to computers

  Do not need to attach to a program

  need to attach to a program in order to operate

  are a type of social engineering

 6. Worms

  Do not need to attach to a program

  need to attach to a program in order to operate

  are a type of social engineering

  are transferred from monkeys and genetically engineered to make them harmful to computers

 7. Trojan Horses

  are designed to access a system by misleading users of intent by hiding behind 'harmless' downloads

  are a type of social engineering

  need to attach to a program in order to operate

  are transferred from monkeys and genetically engineered to make them harmful to computers

 8. Networks like the internet are wonderful inventions and they are risk-free and completely safe.
Note: The video provides an insight into cyber security

  TRUE

  FALSE

 9. The security that is associated with networks and particularly the internet is called:

  cyber dangerauthority

  internet safehavenity

  cyber security or 'cybersecurity'

  sentinel security

 10. One method of data interception is:

  logging in to an authorised web server

  breaking into a cable and physically peering through it

  listening to communications between users without their permission

  listening to radio waves with a thermometer

 11. White box testing assumes knowledge of the internals of the systems.

  TRUE

  FALSE

 12. Pharming is terrifying because the email can be legitimate but clicking on the link takes you to a hacker's website. How?

  All of the above

  The hacker may modify certain files on your computer or hack the DNS server

  The hacker may be the owner of the internet so knows it all

  This cannot be done

 13. ____________ is when the perpetrator obtains information while watching you use the device they want access to.

  pharming

  blagging

  shouldering

  phishing

 14. Baiting is like the real-world Trojan horse that uses physical media and relies on the _____________ of the victim

  health and wealth

  wickedness and technological ability

  curiosity or greed

  religion or ethnicity

 15. Organisations can reduce their security risks by:

  Training employees in security protocols relevant to their position

  Performing unannounced periodic tests of the security framework

  Establishing clear company security protocols (rules) and procedures for handling sensitive data

  All of the above

 16. An example of blagging is a hacker calling a company and pretending to be their network manager.
Blagging is the art of convincing an individual you are someone else in order to obtain sensitive information

  TRUE

  FALSE

 17. The attacks used in social engineering can be used to steal employees' confidential information. One common type of social engineering …

  happens via the download of Microsoft products

  happens via privately secured skype calls

  happens over the phone

  happens between machines

 18. Another example of social engineering is a criminal posing as exterminators, fire marshals and technicians to go unnoticed and…

  steal nothing

  steal engineering devices (e.g. cranes)

  steal anti virus software

  steal company secrets

 19. Spyware are programs that inject adverts into pages and programs on your computer with the aim that the hacker gets advertising revenue

  FALSE

  TRUE

 20. Spyware gathers data about people without their knowledge, including sensitive data like passwords

  TRUE

  FALSE

 21. You can minimise the risk of malware by:

  avoiding going to unknown or 'dodgy' websites

  All of the above

  running regular system scans

  installing Anti Virus software

 22. Some spyware can even use your laptop or comptuer's webcam without your knowledge!

  TRUE

  FALSE

 23. The following list are methods that ….
Biometric Measures
Password Systems
CAPTCHA
Using email confirmations to confirm user identity
Automatic software updates

  are developed by programmers to test a system

  would facilitate attacks and weaken a system or network

  would help prevent cyber security attacks if used correctly

  are developed by hackers to attack a system

 24. A common form of biometric security scanning used in school canteens and mobile phones is:

  fingerprint scanners

  Automatic software updates

  the use of CAPTCHAs

  telephone virus installations

 25. A longer password is always better in terms of a hacker being able to brute force hack it.
a password that contains letters a - z and is 
seven characters long could take just 8 seconds to hack

On the other hand a password that contains letters a - z
and is fourteen characters long could take several million
hours to brute-force hack…

  TRUE

  FALSE