quiz image

Common Hacking Techniques Quiz

SmoothestSeattle avatar
SmoothestSeattle
·
·
Download

Start Quiz

Study Flashcards

34 Questions

What is the most important step to take when opening links?

Check for the lock icon and ensure the link starts with https

What is the minimum number of characters recommended for a strong password?

8 characters

Which of the following is NOT a recommended strategy for creating a strong password?

Using personal information that people can easily guess

Which type of data is covered by the official secrets act and pertains to national security?

Classified Data

Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?

Integrity

What should you do if you receive an email that asks you to delete it and not forward it to others?

Delete the email and do not forward it to others

What is the technique where hackers inject malicious code into a legitimate website?

XSS attacks

Which hacking technique forces victims to land on a fake website by manipulating DNS servers?

DNS spoofing

What is the term used for the hacking technique that uses multiple password combinations until one matches?

Brute force

Which of the following is a technique where hackers use advertising spots on popular websites to lure victims?

Baiting

What is the term used for the hacking technique that takes advantage of vulnerabilities in a website's SQL to gain entry?

SQL injection

Which of the following is a preventive measure against phishing attacks, as mentioned in the text?

Be cautious when receiving emails and check the sender

What is the primary function of the NTU cyber security team?

Cyber security defense, governance, and engineering

What does the acronym AIUP stand for?

Acceptable IT Usage Policy

Which of the following is NOT a recommended practice according to the AIUP?

Using personal email for forwarding university documents

What is the primary purpose of the AIUP?

To protect university information and IT resources

Which of the following is NOT listed as a recommended practice in the AIUP?

Installing software without appropriate licenses

Which of the following is a responsibility of the NTU cyber security team?

Monitoring and responding to cyber attacks on a 24/7 basis

Which hacking technique involves using a fake website that closely resembles a legitimate one?

Phishing

What is the purpose of a DDoS attack?

To bring down a website by overwhelming its servers

Which hacking technique involves exploiting vulnerabilities in website plugins?

Exploiting plugin vulnerabilities

What is the purpose of a cookie theft attack?

To steal login credentials and passwords stored in cookies

Which of the following is a recommended practice to detect and prevent phishing attacks?

Be cautious when receiving emails, and check the sender before clicking on anything

What is the term used for the hacking technique that uses multiple password combinations until one matches?

Brute force

What is the primary purpose of the Acceptable IT Usage Policy (AIUP) mentioned in the text?

To protect university information and IT resources, and minimize risks and damages

Which of the following is NOT listed as a recommended practice in the AIUP 'Don'ts'?

Don't turn off your firewall software

What is the primary function of the NTU cyber security team according to the text?

Detecting and responding to cyber attacks 24/7, 365 days a year

Which of the following is listed as a recommended practice in the AIUP 'Do's'?

Always keep your password safe

Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?

The text does not specify an objective focused on data/information integrity

What does the acronym 'AIUP' stand for?

Acceptable IT Usage Policy

What is the main difference between Open Data and Restricted Data?

Open Data is published online, while Restricted Data is only accessible to a community.

Which level of data security involves information like personal identification information and staff performance reports?

Confidential Data

What should you look out for when opening links to ensure secure browsing?

The presence of the lock icon and an https start

Which type of data is protected by the official secrets act and relates to national security?

Classified Data

Test your knowledge on common hacking techniques such as Social Engineering, Phishing, Baiting, DDoS attacks, Code injection attacks, and SQL injection. Learn about how hackers use these techniques to compromise systems and networks.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Cyber Threats and Hacking Techniques Quiz
6 questions
Website Hacking Techniques Quiz
10 questions
Common Hacking Techniques Quiz
36 questions
Use Quizgecko on...
Browser
Browser