Common Hacking Techniques Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the most important step to take when opening links?

  • Disable your antivirus software to open the link
  • Check for the lock icon and ensure the link starts with `https` (correct)
  • Click the link immediately without checking anything
  • Forward the link to other people to verify its safety

What is the minimum number of characters recommended for a strong password?

  • 5 characters
  • 7 characters
  • 8 characters (correct)
  • 6 characters

Which of the following is NOT a recommended strategy for creating a strong password?

  • Using personal information that people can easily guess (correct)
  • Using uncommon words
  • Using a mix of symbols, numbers, and upper/lower case letters
  • Activating Two-Factor Authentication

Which type of data is covered by the official secrets act and pertains to national security?

<p>Classified Data (D)</p> Signup and view all the answers

Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?

<p>Integrity (C)</p> Signup and view all the answers

What should you do if you receive an email that asks you to delete it and not forward it to others?

<p>Delete the email and do not forward it to others (D)</p> Signup and view all the answers

What is the technique where hackers inject malicious code into a legitimate website?

<p>XSS attacks (B)</p> Signup and view all the answers

Which hacking technique forces victims to land on a fake website by manipulating DNS servers?

<p>DNS spoofing (B)</p> Signup and view all the answers

What is the term used for the hacking technique that uses multiple password combinations until one matches?

<p>Brute force (D)</p> Signup and view all the answers

Which of the following is a technique where hackers use advertising spots on popular websites to lure victims?

<p>Baiting (C)</p> Signup and view all the answers

What is the term used for the hacking technique that takes advantage of vulnerabilities in a website's SQL to gain entry?

<p>SQL injection (D)</p> Signup and view all the answers

Which of the following is a preventive measure against phishing attacks, as mentioned in the text?

<p>Be cautious when receiving emails and check the sender (B)</p> Signup and view all the answers

What is the primary function of the NTU cyber security team?

<p>Cyber security defense, governance, and engineering (A)</p> Signup and view all the answers

What does the acronym AIUP stand for?

<p>Acceptable IT Usage Policy (D)</p> Signup and view all the answers

Which of the following is NOT a recommended practice according to the AIUP?

<p>Using personal email for forwarding university documents (B)</p> Signup and view all the answers

What is the primary purpose of the AIUP?

<p>To protect university information and IT resources (B)</p> Signup and view all the answers

Which of the following is NOT listed as a recommended practice in the AIUP?

<p>Installing software without appropriate licenses (C)</p> Signup and view all the answers

Which of the following is a responsibility of the NTU cyber security team?

<p>Monitoring and responding to cyber attacks on a 24/7 basis (D)</p> Signup and view all the answers

Which hacking technique involves using a fake website that closely resembles a legitimate one?

<p>Phishing (B)</p> Signup and view all the answers

What is the purpose of a DDoS attack?

<p>To bring down a website by overwhelming its servers (B)</p> Signup and view all the answers

Which hacking technique involves exploiting vulnerabilities in website plugins?

<p>Exploiting plugin vulnerabilities (D)</p> Signup and view all the answers

What is the purpose of a cookie theft attack?

<p>To steal login credentials and passwords stored in cookies (D)</p> Signup and view all the answers

Which of the following is a recommended practice to detect and prevent phishing attacks?

<p>Be cautious when receiving emails, and check the sender before clicking on anything (A)</p> Signup and view all the answers

What is the term used for the hacking technique that uses multiple password combinations until one matches?

<p>Brute force (D)</p> Signup and view all the answers

What is the primary purpose of the Acceptable IT Usage Policy (AIUP) mentioned in the text?

<p>To protect university information and IT resources, and minimize risks and damages (A)</p> Signup and view all the answers

Which of the following is NOT listed as a recommended practice in the AIUP 'Don'ts'?

<p>Don't turn off your firewall software (B)</p> Signup and view all the answers

What is the primary function of the NTU cyber security team according to the text?

<p>Detecting and responding to cyber attacks 24/7, 365 days a year (A)</p> Signup and view all the answers

Which of the following is listed as a recommended practice in the AIUP 'Do's'?

<p>Always keep your password safe (B)</p> Signup and view all the answers

Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?

<p>The text does not specify an objective focused on data/information integrity (B)</p> Signup and view all the answers

What does the acronym 'AIUP' stand for?

<p>Acceptable IT Usage Policy (D)</p> Signup and view all the answers

What is the main difference between Open Data and Restricted Data?

<p>Open Data is published online, while Restricted Data is only accessible to a community. (B)</p> Signup and view all the answers

Which level of data security involves information like personal identification information and staff performance reports?

<p>Confidential Data (D)</p> Signup and view all the answers

What should you look out for when opening links to ensure secure browsing?

<p>The presence of the lock icon and an https start (D)</p> Signup and view all the answers

Which type of data is protected by the official secrets act and relates to national security?

<p>Classified Data (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Related Documents

Managing Cybersecurity .docx

More Like This

Anti-Hacking Techniques Quiz
5 questions

Anti-Hacking Techniques Quiz

AttractiveMarsh5348 avatar
AttractiveMarsh5348
System Hacking Techniques Chapter 3
93 questions
Common Hacking Techniques Quiz
36 questions
Social Engineering in Hacking
8 questions

Social Engineering in Hacking

UnquestionableFantasy avatar
UnquestionableFantasy
Use Quizgecko on...
Browser
Browser