Podcast
Questions and Answers
What is the recommended character length for a strong password?
What is the recommended character length for a strong password?
- 8 characters (correct)
- 4 characters
- 10 characters
- 6 characters
Which type of data refers to information like internal meeting minutes or project reports?
Which type of data refers to information like internal meeting minutes or project reports?
- Open Data
- Restricted Data (correct)
- Classified Data
- Confidential Data
What is one of the main objectives of NTU cyber security team as mentioned in the text?
What is one of the main objectives of NTU cyber security team as mentioned in the text?
- Confidentiality (correct)
- Authentication
- Integrity
- Availability
What is the importance of activating Two-Factor Authentication as mentioned in the text?
What is the importance of activating Two-Factor Authentication as mentioned in the text?
Which type of data is covered by the official secrets act as per the text?
Which type of data is covered by the official secrets act as per the text?
What should be avoided when creating a password to make it strong?
What should be avoided when creating a password to make it strong?
What does AIUP stand for?
What does AIUP stand for?
Which of the following is a DO according to AIUP?
Which of the following is a DO according to AIUP?
What is the main function of NTU cyber security defense?
What is the main function of NTU cyber security defense?
What should you do with NTU email for official communications?
What should you do with NTU email for official communications?
Which of the following is a DON'T according to AIUP?
Which of the following is a DON'T according to AIUP?
What is the responsibility of the Cyber security engineering function at NTU?
What is the responsibility of the Cyber security engineering function at NTU?
What hacking technique involves injecting malicious code into a legitimate website?
What hacking technique involves injecting malicious code into a legitimate website?
Which technique involves using fake websites to deceive victims?
Which technique involves using fake websites to deceive victims?
What type of attack involves forcing victims to land on a fake website by changing IP addresses in the DNS server?
What type of attack involves forcing victims to land on a fake website by changing IP addresses in the DNS server?
Which hacking technique involves launching seemingly legitimate ads on popular websites?
Which hacking technique involves launching seemingly legitimate ads on popular websites?
What is the main purpose of a DDoS attack?
What is the main purpose of a DDoS attack?
Which vulnerability is primarily exploited by hackers to take control of a website?
Which vulnerability is primarily exploited by hackers to take control of a website?
How can you ensure a strong password according to the text?
How can you ensure a strong password according to the text?
What level of data security involves information like internal meeting minutes and project reports?
What level of data security involves information like internal meeting minutes and project reports?
What is the main objective of ensuring integrity as mentioned in the text?
What is the main objective of ensuring integrity as mentioned in the text?
What type of information should NOT be used when creating a strong password?
What type of information should NOT be used when creating a strong password?
Which of the following is covered by the official secrets act as mentioned in the text?
Which of the following is covered by the official secrets act as mentioned in the text?
What is the significance of avoiding sharing emails and ensuring links start with https as per the text?
What is the significance of avoiding sharing emails and ensuring links start with https as per the text?
What is the main purpose of the AIUP at NTU?
What is the main purpose of the AIUP at NTU?
Which of the following is a recommended practice according to AIUP?
Which of the following is a recommended practice according to AIUP?
What is one of the key responsibilities of the Cyber security governance function at NTU?
What is one of the key responsibilities of the Cyber security governance function at NTU?
Why is it important to avoid using personal email for forwarding university documents?
Why is it important to avoid using personal email for forwarding university documents?
What is a key aspect of acceptable IT usage in terms of password management?
What is a key aspect of acceptable IT usage in terms of password management?
Which action violates the AIUP at NTU?
Which action violates the AIUP at NTU?
What is the main objective of a DDoS attack?
What is the main objective of a DDoS attack?
How do SQL injection attacks work?
How do SQL injection attacks work?
What does XSS stand for in the context of hacking techniques?
What does XSS stand for in the context of hacking techniques?
How do Baiting attacks lure victims?
How do Baiting attacks lure victims?
What is the primary target of cookie theft by hackers?
What is the primary target of cookie theft by hackers?
How can phishing attacks be detected and prevented based on the text?
How can phishing attacks be detected and prevented based on the text?