Podcast
Questions and Answers
What is the most important step to take when opening links?
What is the most important step to take when opening links?
- Disable your antivirus software to open the link
- Check for the lock icon and ensure the link starts with `https` (correct)
- Click the link immediately without checking anything
- Forward the link to other people to verify its safety
What is the minimum number of characters recommended for a strong password?
What is the minimum number of characters recommended for a strong password?
- 5 characters
- 7 characters
- 8 characters (correct)
- 6 characters
Which of the following is NOT a recommended strategy for creating a strong password?
Which of the following is NOT a recommended strategy for creating a strong password?
- Using personal information that people can easily guess (correct)
- Using uncommon words
- Using a mix of symbols, numbers, and upper/lower case letters
- Activating Two-Factor Authentication
Which type of data is covered by the official secrets act and pertains to national security?
Which type of data is covered by the official secrets act and pertains to national security?
Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?
Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?
What should you do if you receive an email that asks you to delete it and not forward it to others?
What should you do if you receive an email that asks you to delete it and not forward it to others?
What is the technique where hackers inject malicious code into a legitimate website?
What is the technique where hackers inject malicious code into a legitimate website?
Which hacking technique forces victims to land on a fake website by manipulating DNS servers?
Which hacking technique forces victims to land on a fake website by manipulating DNS servers?
What is the term used for the hacking technique that uses multiple password combinations until one matches?
What is the term used for the hacking technique that uses multiple password combinations until one matches?
Which of the following is a technique where hackers use advertising spots on popular websites to lure victims?
Which of the following is a technique where hackers use advertising spots on popular websites to lure victims?
What is the term used for the hacking technique that takes advantage of vulnerabilities in a website's SQL to gain entry?
What is the term used for the hacking technique that takes advantage of vulnerabilities in a website's SQL to gain entry?
Which of the following is a preventive measure against phishing attacks, as mentioned in the text?
Which of the following is a preventive measure against phishing attacks, as mentioned in the text?
What is the primary function of the NTU cyber security team?
What is the primary function of the NTU cyber security team?
What does the acronym AIUP stand for?
What does the acronym AIUP stand for?
Which of the following is NOT a recommended practice according to the AIUP?
Which of the following is NOT a recommended practice according to the AIUP?
What is the primary purpose of the AIUP?
What is the primary purpose of the AIUP?
Which of the following is NOT listed as a recommended practice in the AIUP?
Which of the following is NOT listed as a recommended practice in the AIUP?
Which of the following is a responsibility of the NTU cyber security team?
Which of the following is a responsibility of the NTU cyber security team?
Which hacking technique involves using a fake website that closely resembles a legitimate one?
Which hacking technique involves using a fake website that closely resembles a legitimate one?
What is the purpose of a DDoS attack?
What is the purpose of a DDoS attack?
Which hacking technique involves exploiting vulnerabilities in website plugins?
Which hacking technique involves exploiting vulnerabilities in website plugins?
What is the purpose of a cookie theft attack?
What is the purpose of a cookie theft attack?
Which of the following is a recommended practice to detect and prevent phishing attacks?
Which of the following is a recommended practice to detect and prevent phishing attacks?
What is the term used for the hacking technique that uses multiple password combinations until one matches?
What is the term used for the hacking technique that uses multiple password combinations until one matches?
What is the primary purpose of the Acceptable IT Usage Policy (AIUP) mentioned in the text?
What is the primary purpose of the Acceptable IT Usage Policy (AIUP) mentioned in the text?
Which of the following is NOT listed as a recommended practice in the AIUP 'Don'ts'?
Which of the following is NOT listed as a recommended practice in the AIUP 'Don'ts'?
What is the primary function of the NTU cyber security team according to the text?
What is the primary function of the NTU cyber security team according to the text?
Which of the following is listed as a recommended practice in the AIUP 'Do's'?
Which of the following is listed as a recommended practice in the AIUP 'Do's'?
Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?
Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?
What does the acronym 'AIUP' stand for?
What does the acronym 'AIUP' stand for?
What is the main difference between Open Data and Restricted Data?
What is the main difference between Open Data and Restricted Data?
Which level of data security involves information like personal identification information and staff performance reports?
Which level of data security involves information like personal identification information and staff performance reports?
What should you look out for when opening links to ensure secure browsing?
What should you look out for when opening links to ensure secure browsing?
Which type of data is protected by the official secrets act and relates to national security?
Which type of data is protected by the official secrets act and relates to national security?
Flashcards are hidden until you start studying