Preview

07 - Final Test

 1. What can viruses affect?

  RAM

  All of the above

  Hard drive

  Keyboard

 2. How do hackers use viruses?

  All of the above

  To get someone's personal information

  To find out card or bank detals

  To make a computer unusable

 3. Sending requests to a single server using hijacked machines is:

  a worm attack

  a networked hack attack

  Phishing

  a DDOS attack

 4. Social engineering, phishing and worms are examples of:

  Viruses

  Social engineering

  Hardware scams

  Data interception

 5. Data travels across networks in ….
(and it is these ___________ that are often under attack)

  bits

  blocks

  packets

  text snippets

 6. A network of computers infected with malicious software and controlled as part of a group without the owner's knowledge is:

  BingNet

  VirusNet

  Botnet

  Snixnet

 7. Network forensics typically involves the examination of data sent across a network

  TRUE

  FALSE

 8. This is software that provides a 'barrier' between a potential hacker and the computer system

  firewall

  anti virus software

  malware

  malware

 9. These define access permissions for a user (pertaining to a network)

  Use maintenance

  Firewalls

  Group permissions

  User access levels

 10. Additional security requirements to use alongside passwords could include:

  Require two-factor authentication

  Use password complexity rules (e.g. length and special characters)

  All of the above

  limit the number of password guesses

 11. Encryption is a method of bypassing viruses and ensuring that code is stored as plain text securely.

  TRUE

  FALSE

 12. Typically, what level of access what a student have to the network, in a school?

  Access to printers only

  Access to own documents, certain shared documents and the internet

  Access to all folders on the network

  Full Access

 13. They are side effects of the freedom and ease of communicating online and therefore…

  it is likely that the government will ban the internet from all homes and return it to government-only use

  it is unlikely cyber vulnerabilities will ever completely go away

  None of the above

  it is likely that cyber vulnerabilities will be eliminated in the next two years

 14. An example of social engineering is:

  Worms

  Trojan Horses

  Telephone IVR Phishing

  Viruses

 15. A example of a network policy that may help with security is:

  Data Theft

  Phishing

  Acceptable Use Policy

  Virus

 16. Malware is a manufacturer of corrupt (but cheap) computer parts

  TRUE

  FALSE

 17. Viruses

  Do not need to attach to a program

  are transferred from monkeys and genetically engineered to make them harmful to computers

  are a type of social engineering

  need to attach to a program in order to operate

 18. Worms

  are transferred from monkeys and genetically engineered to make them harmful to computers

  are a type of social engineering

  Do not need to attach to a program

  need to attach to a program in order to operate

 19. Trojan Horses

  are designed to access a system by misleading users of intent by hiding behind 'harmless' downloads

  are a type of social engineering

  are transferred from monkeys and genetically engineered to make them harmful to computers

  need to attach to a program in order to operate

 20. Networks like the internet are wonderful inventions and they are risk-free and completely safe.
Note: The video provides an insight into cyber security

  FALSE

  TRUE

 21. The security that is associated with networks and particularly the internet is called:

  cyber dangerauthority

  sentinel security

  internet safehavenity

  cyber security or 'cybersecurity'

 22. One method of data interception is:

  listening to radio waves with a thermometer

  logging in to an authorised web server

  listening to communications between users without their permission

  breaking into a cable and physically peering through it

 23. Pharming is terrifying because the email can be legitimate but clicking on the link takes you to a hacker's website. How?

  The hacker may be the owner of the internet so knows it all

  All of the above

  This cannot be done

  The hacker may modify certain files on your computer or hack the DNS server

 24. ____________ is when the perpetrator obtains information while watching you use the device they want access to.

  pharming

  phishing

  shouldering

  blagging

 25. Baiting is like the real-world Trojan horse that uses physical media and relies on the _____________ of the victim

  wickedness and technological ability

  religion or ethnicity

  health and wealth

  curiosity or greed

 26. Organisations can reduce their security risks by:

  Performing unannounced periodic tests of the security framework

  Training employees in security protocols relevant to their position

  All of the above

  Establishing clear company security protocols (rules) and procedures for handling sensitive data

 27. An example of blagging is a hacker calling a company and pretending to be their network manager.
Blagging is the art of convincing an individual you are someone else in order to obtain sensitive information

  TRUE

  FALSE

 28. The attacks used in social engineering can be used to steal employees' confidential information. One common type of social engineering …

  happens between machines

  happens via the download of Microsoft products

  happens over the phone

  happens via privately secured skype calls

 29. Another example of social engineering is a criminal posing as exterminators, fire marshals and technicians to go unnoticed and…

  steal company secrets

  steal engineering devices (e.g. cranes)

  steal nothing

  steal anti virus software

 30. Spyware are programs that inject adverts into pages and programs on your computer with the aim that the hacker gets advertising revenue

  TRUE

  FALSE

 31. Spyware gathers data about people without their knowledge, including sensitive data like passwords

  FALSE

  TRUE

 32. You can minimise the risk of malware by:

  running regular system scans

  installing Anti Virus software

  avoiding going to unknown or 'dodgy' websites

  All of the above

 33. Some spyware can even use your laptop or comptuer's webcam without your knowledge!

  FALSE

  TRUE

 34. The following list are methods that ….
Biometric Measures
Password Systems
CAPTCHA
Using email confirmations to confirm user identity
Automatic software updates

  would help prevent cyber security attacks if used correctly

  would facilitate attacks and weaken a system or network

  are developed by programmers to test a system

  are developed by hackers to attack a system

 35. A common form of biometric security scanning used in school canteens and mobile phones is:

  fingerprint scanners

  the use of CAPTCHAs

  Automatic software updates

  telephone virus installations

 36. A longer password is always better in terms of a hacker being able to brute force hack it.
a password that contains letters a - z and is 
seven characters long could take just 8 seconds to hack

On the other hand a password that contains letters a - z
and is fourteen characters long could take several million
hours to brute-force hack…

  TRUE

  FALSE

 37. It is perfectly okay to communicate with strangers online so long as you only give them your phone number (and not your home address)

  FALSE

  TRUE

 38. In Cyber security the term "Resilience" refers to the ability of IT systems to recover from attack

  TRUE

  FALSE

 39. Cyber crime refers to any crime that involves computers and networks

  FALSE

  TRUE

 40. What does the term 'cyber' refer to?

  The term 'cyber' was invented by the egyptians and is another word for 'binary' (two)

  relating to inappropriate actions or videos that are displayed across a network like the internet

  The term 'cyber' means 'robot' in latin

  relating to or characteristic of the culture of computers, information technology, and virtual reality.