Common Hacking Techniques Quiz
36 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the recommended character length for a strong password?

  • 8 characters (correct)
  • 4 characters
  • 10 characters
  • 6 characters

Which type of data refers to information like internal meeting minutes or project reports?

  • Open Data
  • Restricted Data (correct)
  • Classified Data
  • Confidential Data

What is one of the main objectives of NTU cyber security team as mentioned in the text?

  • Confidentiality (correct)
  • Authentication
  • Integrity
  • Availability

What is the importance of activating Two-Factor Authentication as mentioned in the text?

<p>To verify identity through multiple methods (D)</p> Signup and view all the answers

Which type of data is covered by the official secrets act as per the text?

<p>Classified Data (A)</p> Signup and view all the answers

What should be avoided when creating a password to make it strong?

<p>Making the password easy to guess (D)</p> Signup and view all the answers

What does AIUP stand for?

<p>Acceptable IT Usage Policy (A)</p> Signup and view all the answers

Which of the following is a DO according to AIUP?

<p>Turning off your anti-virus software (B)</p> Signup and view all the answers

What is the main function of NTU cyber security defense?

<p>Detecting and responding to cyber attacks (D)</p> Signup and view all the answers

What should you do with NTU email for official communications?

<p>Use it for all official communications (D)</p> Signup and view all the answers

Which of the following is a DON'T according to AIUP?

<p>Sharing your password with anyone (B)</p> Signup and view all the answers

What is the responsibility of the Cyber security engineering function at NTU?

<p>Exploring different technologies to enhance cyber security (A)</p> Signup and view all the answers

What hacking technique involves injecting malicious code into a legitimate website?

<p>SQL injection (D)</p> Signup and view all the answers

Which technique involves using fake websites to deceive victims?

<p>Phishing (B)</p> Signup and view all the answers

What type of attack involves forcing victims to land on a fake website by changing IP addresses in the DNS server?

<p>DNS spoofing (B)</p> Signup and view all the answers

Which hacking technique involves launching seemingly legitimate ads on popular websites?

<p>Baiting (B)</p> Signup and view all the answers

What is the main purpose of a DDoS attack?

<p>Bring down websites by crashing servers (D)</p> Signup and view all the answers

Which vulnerability is primarily exploited by hackers to take control of a website?

<p>Exploiting plugin vulnerabilities (A)</p> Signup and view all the answers

How can you ensure a strong password according to the text?

<p>Having 8 characters in the password (C)</p> Signup and view all the answers

What level of data security involves information like internal meeting minutes and project reports?

<p>Restricted Data (A)</p> Signup and view all the answers

What is the main objective of ensuring integrity as mentioned in the text?

<p>Ensuring data accuracy and unmodified content (C)</p> Signup and view all the answers

What type of information should NOT be used when creating a strong password?

<p>Personal information (B)</p> Signup and view all the answers

Which of the following is covered by the official secrets act as mentioned in the text?

<p>Personal identification information (D)</p> Signup and view all the answers

What is the significance of avoiding sharing emails and ensuring links start with https as per the text?

<p>To ensure secure communication and prevent phishing attacks (D)</p> Signup and view all the answers

What is the main purpose of the AIUP at NTU?

<p>To protect university information and IT resources (A)</p> Signup and view all the answers

Which of the following is a recommended practice according to AIUP?

<p>Regularly updating software with security patches (B)</p> Signup and view all the answers

What is one of the key responsibilities of the Cyber security governance function at NTU?

<p>Developing and maintaining policies, standards, and procedures (C)</p> Signup and view all the answers

Why is it important to avoid using personal email for forwarding university documents?

<p>To ensure the security of university information (B)</p> Signup and view all the answers

What is a key aspect of acceptable IT usage in terms of password management?

<p>Updating passwords regularly (B)</p> Signup and view all the answers

Which action violates the AIUP at NTU?

<p>Installing software without appropriate licenses (D)</p> Signup and view all the answers

What is the main objective of a DDoS attack?

<p>To bring down websites by crashing their servers (C)</p> Signup and view all the answers

How do SQL injection attacks work?

<p>By exploiting vulnerabilities in a website's SQL to gain entry into libraries and databases (A)</p> Signup and view all the answers

What does XSS stand for in the context of hacking techniques?

<p>Cross-Site Scripting (A)</p> Signup and view all the answers

How do Baiting attacks lure victims?

<p>By using advertising spots on popular websites with deceptive ads (D)</p> Signup and view all the answers

What is the primary target of cookie theft by hackers?

<p>Stealing login credentials and passwords (B)</p> Signup and view all the answers

How can phishing attacks be detected and prevented based on the text?

<p>Report suspicious emails to the official ServiceNow account (C)</p> Signup and view all the answers

More Like This

Website Hacking Techniques Quiz
10 questions
Common Hacking Techniques Quiz
34 questions
Social Engineering in Hacking
8 questions

Social Engineering in Hacking

UnquestionableFantasy avatar
UnquestionableFantasy
Ingegneria Sociale e Hacking
30 questions

Ingegneria Sociale e Hacking

InstructivePeninsula4058 avatar
InstructivePeninsula4058
Use Quizgecko on...
Browser
Browser