Podcast
Questions and Answers
What is the most important step to take when opening links?
What is the most important step to take when opening links?
What is the minimum number of characters recommended for a strong password?
What is the minimum number of characters recommended for a strong password?
Which of the following is NOT a recommended strategy for creating a strong password?
Which of the following is NOT a recommended strategy for creating a strong password?
Which type of data is covered by the official secrets act and pertains to national security?
Which type of data is covered by the official secrets act and pertains to national security?
Signup and view all the answers
Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?
Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?
Signup and view all the answers
What should you do if you receive an email that asks you to delete it and not forward it to others?
What should you do if you receive an email that asks you to delete it and not forward it to others?
Signup and view all the answers
What is the technique where hackers inject malicious code into a legitimate website?
What is the technique where hackers inject malicious code into a legitimate website?
Signup and view all the answers
Which hacking technique forces victims to land on a fake website by manipulating DNS servers?
Which hacking technique forces victims to land on a fake website by manipulating DNS servers?
Signup and view all the answers
What is the term used for the hacking technique that uses multiple password combinations until one matches?
What is the term used for the hacking technique that uses multiple password combinations until one matches?
Signup and view all the answers
Which of the following is a technique where hackers use advertising spots on popular websites to lure victims?
Which of the following is a technique where hackers use advertising spots on popular websites to lure victims?
Signup and view all the answers
What is the term used for the hacking technique that takes advantage of vulnerabilities in a website's SQL to gain entry?
What is the term used for the hacking technique that takes advantage of vulnerabilities in a website's SQL to gain entry?
Signup and view all the answers
Which of the following is a preventive measure against phishing attacks, as mentioned in the text?
Which of the following is a preventive measure against phishing attacks, as mentioned in the text?
Signup and view all the answers
What is the primary function of the NTU cyber security team?
What is the primary function of the NTU cyber security team?
Signup and view all the answers
What does the acronym AIUP stand for?
What does the acronym AIUP stand for?
Signup and view all the answers
Which of the following is NOT a recommended practice according to the AIUP?
Which of the following is NOT a recommended practice according to the AIUP?
Signup and view all the answers
What is the primary purpose of the AIUP?
What is the primary purpose of the AIUP?
Signup and view all the answers
Which of the following is NOT listed as a recommended practice in the AIUP?
Which of the following is NOT listed as a recommended practice in the AIUP?
Signup and view all the answers
Which of the following is a responsibility of the NTU cyber security team?
Which of the following is a responsibility of the NTU cyber security team?
Signup and view all the answers
Which hacking technique involves using a fake website that closely resembles a legitimate one?
Which hacking technique involves using a fake website that closely resembles a legitimate one?
Signup and view all the answers
What is the purpose of a DDoS attack?
What is the purpose of a DDoS attack?
Signup and view all the answers
Which hacking technique involves exploiting vulnerabilities in website plugins?
Which hacking technique involves exploiting vulnerabilities in website plugins?
Signup and view all the answers
What is the purpose of a cookie theft attack?
What is the purpose of a cookie theft attack?
Signup and view all the answers
Which of the following is a recommended practice to detect and prevent phishing attacks?
Which of the following is a recommended practice to detect and prevent phishing attacks?
Signup and view all the answers
What is the term used for the hacking technique that uses multiple password combinations until one matches?
What is the term used for the hacking technique that uses multiple password combinations until one matches?
Signup and view all the answers
What is the primary purpose of the Acceptable IT Usage Policy (AIUP) mentioned in the text?
What is the primary purpose of the Acceptable IT Usage Policy (AIUP) mentioned in the text?
Signup and view all the answers
Which of the following is NOT listed as a recommended practice in the AIUP 'Don'ts'?
Which of the following is NOT listed as a recommended practice in the AIUP 'Don'ts'?
Signup and view all the answers
What is the primary function of the NTU cyber security team according to the text?
What is the primary function of the NTU cyber security team according to the text?
Signup and view all the answers
Which of the following is listed as a recommended practice in the AIUP 'Do's'?
Which of the following is listed as a recommended practice in the AIUP 'Do's'?
Signup and view all the answers
Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?
Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?
Signup and view all the answers
What does the acronym 'AIUP' stand for?
What does the acronym 'AIUP' stand for?
Signup and view all the answers
What is the main difference between Open Data and Restricted Data?
What is the main difference between Open Data and Restricted Data?
Signup and view all the answers
Which level of data security involves information like personal identification information and staff performance reports?
Which level of data security involves information like personal identification information and staff performance reports?
Signup and view all the answers
What should you look out for when opening links to ensure secure browsing?
What should you look out for when opening links to ensure secure browsing?
Signup and view all the answers
Which type of data is protected by the official secrets act and relates to national security?
Which type of data is protected by the official secrets act and relates to national security?
Signup and view all the answers