Exit quiz
10 Questions
0 Views

Exit quiz

Created by
@UserReplaceableAlder

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

When data has been processed and is meaningful, which of these has it become?

  • Processed data
  • Information (correct)
  • Identifiable data
  • Profiled data
  • Is the following data or information: "Sophie got 38 out of 40 on her English test"?

  • Information (correct)
  • Data
  • Which one of the following best describes social engineering?

  • An automated attack on computing systems
  • Cybercriminals stealing data through hacking into systems
  • Websites deceiving humans into giving away personal data
  • Humans using methods to trick or manipulate other humans into handing over information (correct)
  • "An attack that involves an attacker watching the victim while they provide sensitive information" is a description of which of the following?

    <p>Shouldering</p> Signup and view all the answers

    You receive an email from an unknown source sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?

    <p>Blagging</p> Signup and view all the answers

    Fill in the blanks regarding the definition of a Brute force attack: This is a form of (blank) that makes (blank) (blank) to (blank) something such as a (blank). Words to use: password, attempts, attack, discover, multiple

    <p>This is a form of attack that makes multiple attempts to discover something such as a password.</p> Signup and view all the answers

    Which of the following are principles that must be followed in the Data Protection Act 2018?

    <p>All of the above</p> Signup and view all the answers

    Why is it called phishing, as in 'fishing'?

    Signup and view all the answers

    What simple password rules would you set yourself to reduce the chance of a brute force attack being successful? Name two

    Signup and view all the answers

    What can you do to stop yourself from becoming a victim of a social engineering attack? Choose one type of attack and how to protect yourself.

    Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser