quiz image

Common Hacking Techniques Quiz

SmoothestSeattle avatar
SmoothestSeattle
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is the recommended character length for a strong password?

8 characters

Which type of data refers to information like internal meeting minutes or project reports?

Restricted Data

What is one of the main objectives of NTU cyber security team as mentioned in the text?

Confidentiality

What is the importance of activating Two-Factor Authentication as mentioned in the text?

<p>To verify identity through multiple methods</p> Signup and view all the answers

Which type of data is covered by the official secrets act as per the text?

<p>Classified Data</p> Signup and view all the answers

What should be avoided when creating a password to make it strong?

<p>Making the password easy to guess</p> Signup and view all the answers

What does AIUP stand for?

<p>Acceptable IT Usage Policy</p> Signup and view all the answers

Which of the following is a DO according to AIUP?

<p>Turning off your anti-virus software</p> Signup and view all the answers

What is the main function of NTU cyber security defense?

<p>Detecting and responding to cyber attacks</p> Signup and view all the answers

What should you do with NTU email for official communications?

<p>Use it for all official communications</p> Signup and view all the answers

Which of the following is a DON'T according to AIUP?

<p>Sharing your password with anyone</p> Signup and view all the answers

What is the responsibility of the Cyber security engineering function at NTU?

<p>Exploring different technologies to enhance cyber security</p> Signup and view all the answers

What hacking technique involves injecting malicious code into a legitimate website?

<p>SQL injection</p> Signup and view all the answers

Which technique involves using fake websites to deceive victims?

<p>Phishing</p> Signup and view all the answers

What type of attack involves forcing victims to land on a fake website by changing IP addresses in the DNS server?

<p>DNS spoofing</p> Signup and view all the answers

Which hacking technique involves launching seemingly legitimate ads on popular websites?

<p>Baiting</p> Signup and view all the answers

What is the main purpose of a DDoS attack?

<p>Bring down websites by crashing servers</p> Signup and view all the answers

Which vulnerability is primarily exploited by hackers to take control of a website?

<p>Exploiting plugin vulnerabilities</p> Signup and view all the answers

How can you ensure a strong password according to the text?

<p>Having 8 characters in the password</p> Signup and view all the answers

What level of data security involves information like internal meeting minutes and project reports?

<p>Restricted Data</p> Signup and view all the answers

What is the main objective of ensuring integrity as mentioned in the text?

<p>Ensuring data accuracy and unmodified content</p> Signup and view all the answers

What type of information should NOT be used when creating a strong password?

<p>Personal information</p> Signup and view all the answers

Which of the following is covered by the official secrets act as mentioned in the text?

<p>Personal identification information</p> Signup and view all the answers

What is the significance of avoiding sharing emails and ensuring links start with https as per the text?

<p>To ensure secure communication and prevent phishing attacks</p> Signup and view all the answers

What is the main purpose of the AIUP at NTU?

<p>To protect university information and IT resources</p> Signup and view all the answers

Which of the following is a recommended practice according to AIUP?

<p>Regularly updating software with security patches</p> Signup and view all the answers

What is one of the key responsibilities of the Cyber security governance function at NTU?

<p>Developing and maintaining policies, standards, and procedures</p> Signup and view all the answers

Why is it important to avoid using personal email for forwarding university documents?

<p>To ensure the security of university information</p> Signup and view all the answers

What is a key aspect of acceptable IT usage in terms of password management?

<p>Updating passwords regularly</p> Signup and view all the answers

Which action violates the AIUP at NTU?

<p>Installing software without appropriate licenses</p> Signup and view all the answers

What is the main objective of a DDoS attack?

<p>To bring down websites by crashing their servers</p> Signup and view all the answers

How do SQL injection attacks work?

<p>By exploiting vulnerabilities in a website's SQL to gain entry into libraries and databases</p> Signup and view all the answers

What does XSS stand for in the context of hacking techniques?

<p>Cross-Site Scripting</p> Signup and view all the answers

How do Baiting attacks lure victims?

<p>By using advertising spots on popular websites with deceptive ads</p> Signup and view all the answers

What is the primary target of cookie theft by hackers?

<p>Stealing login credentials and passwords</p> Signup and view all the answers

How can phishing attacks be detected and prevented based on the text?

<p>Report suspicious emails to the official ServiceNow account</p> Signup and view all the answers

More Quizzes Like This

Cyber Threats and Hacking Techniques Quiz
6 questions
Website Hacking Techniques Quiz
10 questions
Anti-Hacking Techniques Quiz
5 questions

Anti-Hacking Techniques Quiz

AttractiveMarsh5348 avatar
AttractiveMarsh5348
Common Hacking Techniques Quiz
34 questions
Use Quizgecko on...
Browser
Browser