34 Questions
What is the most important step to take when opening links?
Check for the lock icon and ensure the link starts with https
What is the minimum number of characters recommended for a strong password?
8 characters
Which of the following is NOT a recommended strategy for creating a strong password?
Using personal information that people can easily guess
Which type of data is covered by the official secrets act and pertains to national security?
Classified Data
Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?
Integrity
What should you do if you receive an email that asks you to delete it and not forward it to others?
Delete the email and do not forward it to others
What is the technique where hackers inject malicious code into a legitimate website?
XSS attacks
Which hacking technique forces victims to land on a fake website by manipulating DNS servers?
DNS spoofing
What is the term used for the hacking technique that uses multiple password combinations until one matches?
Brute force
Which of the following is a technique where hackers use advertising spots on popular websites to lure victims?
Baiting
What is the term used for the hacking technique that takes advantage of vulnerabilities in a website's SQL to gain entry?
SQL injection
Which of the following is a preventive measure against phishing attacks, as mentioned in the text?
Be cautious when receiving emails and check the sender
What is the primary function of the NTU cyber security team?
Cyber security defense, governance, and engineering
What does the acronym AIUP stand for?
Acceptable IT Usage Policy
Which of the following is NOT a recommended practice according to the AIUP?
Using personal email for forwarding university documents
What is the primary purpose of the AIUP?
To protect university information and IT resources
Which of the following is NOT listed as a recommended practice in the AIUP?
Installing software without appropriate licenses
Which of the following is a responsibility of the NTU cyber security team?
Monitoring and responding to cyber attacks on a 24/7 basis
Which hacking technique involves using a fake website that closely resembles a legitimate one?
Phishing
What is the purpose of a DDoS attack?
To bring down a website by overwhelming its servers
Which hacking technique involves exploiting vulnerabilities in website plugins?
Exploiting plugin vulnerabilities
What is the purpose of a cookie theft attack?
To steal login credentials and passwords stored in cookies
Which of the following is a recommended practice to detect and prevent phishing attacks?
Be cautious when receiving emails, and check the sender before clicking on anything
What is the term used for the hacking technique that uses multiple password combinations until one matches?
Brute force
What is the primary purpose of the Acceptable IT Usage Policy (AIUP) mentioned in the text?
To protect university information and IT resources, and minimize risks and damages
Which of the following is NOT listed as a recommended practice in the AIUP 'Don'ts'?
Don't turn off your firewall software
What is the primary function of the NTU cyber security team according to the text?
Detecting and responding to cyber attacks 24/7, 365 days a year
Which of the following is listed as a recommended practice in the AIUP 'Do's'?
Always keep your password safe
Which of the three main cybersecurity objectives for NTU is focused on ensuring data or information remains accurate and unmodified?
The text does not specify an objective focused on data/information integrity
What does the acronym 'AIUP' stand for?
Acceptable IT Usage Policy
What is the main difference between Open Data and Restricted Data?
Open Data is published online, while Restricted Data is only accessible to a community.
Which level of data security involves information like personal identification information and staff performance reports?
Confidential Data
What should you look out for when opening links to ensure secure browsing?
The presence of the lock icon and an https start
Which type of data is protected by the official secrets act and relates to national security?
Classified Data
Test your knowledge on common hacking techniques such as Social Engineering, Phishing, Baiting, DDoS attacks, Code injection attacks, and SQL injection. Learn about how hackers use these techniques to compromise systems and networks.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free