Common Hacking Techniques Quiz
34 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the most important step to take when opening links?

  • Disable your antivirus software to open the link
  • Check for the lock icon and ensure the link starts with `https` (correct)
  • Click the link immediately without checking anything
  • Forward the link to other people to verify its safety
  • What is the minimum number of characters recommended for a strong password?

  • 5 characters
  • 7 characters
  • 8 characters (correct)
  • 6 characters
  • Which of the following is NOT a recommended strategy for creating a strong password?

  • Using personal information that people can easily guess (correct)
  • Using uncommon words
  • Using a mix of symbols, numbers, and upper/lower case letters
  • Activating Two-Factor Authentication
  • Which type of data is covered by the official secrets act and pertains to national security?

    <p>Classified Data</p> Signup and view all the answers

    Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?

    <p>Integrity</p> Signup and view all the answers

    What should you do if you receive an email that asks you to delete it and not forward it to others?

    <p>Delete the email and do not forward it to others</p> Signup and view all the answers

    What is the technique where hackers inject malicious code into a legitimate website?

    <p>XSS attacks</p> Signup and view all the answers

    Which hacking technique forces victims to land on a fake website by manipulating DNS servers?

    <p>DNS spoofing</p> Signup and view all the answers

    What is the term used for the hacking technique that uses multiple password combinations until one matches?

    <p>Brute force</p> Signup and view all the answers

    Which of the following is a technique where hackers use advertising spots on popular websites to lure victims?

    <p>Baiting</p> Signup and view all the answers

    What is the term used for the hacking technique that takes advantage of vulnerabilities in a website's SQL to gain entry?

    <p>SQL injection</p> Signup and view all the answers

    Which of the following is a preventive measure against phishing attacks, as mentioned in the text?

    <p>Be cautious when receiving emails and check the sender</p> Signup and view all the answers

    What is the primary function of the NTU cyber security team?

    <p>Cyber security defense, governance, and engineering</p> Signup and view all the answers

    What does the acronym AIUP stand for?

    <p>Acceptable IT Usage Policy</p> Signup and view all the answers

    Which of the following is NOT a recommended practice according to the AIUP?

    <p>Using personal email for forwarding university documents</p> Signup and view all the answers

    What is the primary purpose of the AIUP?

    <p>To protect university information and IT resources</p> Signup and view all the answers

    Which of the following is NOT listed as a recommended practice in the AIUP?

    <p>Installing software without appropriate licenses</p> Signup and view all the answers

    Which of the following is a responsibility of the NTU cyber security team?

    <p>Monitoring and responding to cyber attacks on a 24/7 basis</p> Signup and view all the answers

    Which hacking technique involves using a fake website that closely resembles a legitimate one?

    <p>Phishing</p> Signup and view all the answers

    What is the purpose of a DDoS attack?

    <p>To bring down a website by overwhelming its servers</p> Signup and view all the answers

    Which hacking technique involves exploiting vulnerabilities in website plugins?

    <p>Exploiting plugin vulnerabilities</p> Signup and view all the answers

    What is the purpose of a cookie theft attack?

    <p>To steal login credentials and passwords stored in cookies</p> Signup and view all the answers

    Which of the following is a recommended practice to detect and prevent phishing attacks?

    <p>Be cautious when receiving emails, and check the sender before clicking on anything</p> Signup and view all the answers

    What is the term used for the hacking technique that uses multiple password combinations until one matches?

    <p>Brute force</p> Signup and view all the answers

    What is the primary purpose of the Acceptable IT Usage Policy (AIUP) mentioned in the text?

    <p>To protect university information and IT resources, and minimize risks and damages</p> Signup and view all the answers

    Which of the following is NOT listed as a recommended practice in the AIUP 'Don'ts'?

    <p>Don't turn off your firewall software</p> Signup and view all the answers

    What is the primary function of the NTU cyber security team according to the text?

    <p>Detecting and responding to cyber attacks 24/7, 365 days a year</p> Signup and view all the answers

    Which of the following is listed as a recommended practice in the AIUP 'Do's'?

    <p>Always keep your password safe</p> Signup and view all the answers

    Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?

    <p>The text does not specify an objective focused on data/information integrity</p> Signup and view all the answers

    What does the acronym 'AIUP' stand for?

    <p>Acceptable IT Usage Policy</p> Signup and view all the answers

    What is the main difference between Open Data and Restricted Data?

    <p>Open Data is published online, while Restricted Data is only accessible to a community.</p> Signup and view all the answers

    Which level of data security involves information like personal identification information and staff performance reports?

    <p>Confidential Data</p> Signup and view all the answers

    What should you look out for when opening links to ensure secure browsing?

    <p>The presence of the lock icon and an https start</p> Signup and view all the answers

    Which type of data is protected by the official secrets act and relates to national security?

    <p>Classified Data</p> Signup and view all the answers

    More Like This

    Website Hacking Techniques Quiz
    10 questions
    Anti-Hacking Techniques Quiz
    5 questions

    Anti-Hacking Techniques Quiz

    AttractiveMarsh5348 avatar
    AttractiveMarsh5348
    Common Hacking Techniques Quiz
    36 questions
    Social Engineering in Hacking
    8 questions

    Social Engineering in Hacking

    UnquestionableFantasy avatar
    UnquestionableFantasy
    Use Quizgecko on...
    Browser
    Browser