Questions and Answers
What is the recommended character length for a strong password?
8 characters
Which type of data refers to information like internal meeting minutes or project reports?
Restricted Data
What is one of the main objectives of NTU cyber security team as mentioned in the text?
Confidentiality
What is the importance of activating Two-Factor Authentication as mentioned in the text?
Signup and view all the answers
Which type of data is covered by the official secrets act as per the text?
Signup and view all the answers
What should be avoided when creating a password to make it strong?
Signup and view all the answers
What does AIUP stand for?
Signup and view all the answers
Which of the following is a DO according to AIUP?
Signup and view all the answers
What is the main function of NTU cyber security defense?
Signup and view all the answers
What should you do with NTU email for official communications?
Signup and view all the answers
Which of the following is a DON'T according to AIUP?
Signup and view all the answers
What is the responsibility of the Cyber security engineering function at NTU?
Signup and view all the answers
What hacking technique involves injecting malicious code into a legitimate website?
Signup and view all the answers
Which technique involves using fake websites to deceive victims?
Signup and view all the answers
What type of attack involves forcing victims to land on a fake website by changing IP addresses in the DNS server?
Signup and view all the answers
Which hacking technique involves launching seemingly legitimate ads on popular websites?
Signup and view all the answers
What is the main purpose of a DDoS attack?
Signup and view all the answers
Which vulnerability is primarily exploited by hackers to take control of a website?
Signup and view all the answers
How can you ensure a strong password according to the text?
Signup and view all the answers
What level of data security involves information like internal meeting minutes and project reports?
Signup and view all the answers
What is the main objective of ensuring integrity as mentioned in the text?
Signup and view all the answers
What type of information should NOT be used when creating a strong password?
Signup and view all the answers
Which of the following is covered by the official secrets act as mentioned in the text?
Signup and view all the answers
What is the significance of avoiding sharing emails and ensuring links start with https as per the text?
Signup and view all the answers
What is the main purpose of the AIUP at NTU?
Signup and view all the answers
Which of the following is a recommended practice according to AIUP?
Signup and view all the answers
What is one of the key responsibilities of the Cyber security governance function at NTU?
Signup and view all the answers
Why is it important to avoid using personal email for forwarding university documents?
Signup and view all the answers
What is a key aspect of acceptable IT usage in terms of password management?
Signup and view all the answers
Which action violates the AIUP at NTU?
Signup and view all the answers
What is the main objective of a DDoS attack?
Signup and view all the answers
How do SQL injection attacks work?
Signup and view all the answers
What does XSS stand for in the context of hacking techniques?
Signup and view all the answers
How do Baiting attacks lure victims?
Signup and view all the answers
What is the primary target of cookie theft by hackers?
Signup and view all the answers
How can phishing attacks be detected and prevented based on the text?
Signup and view all the answers