Podcast
Questions and Answers
When data has been processed and is meaningful, which of these has it become?
When data has been processed and is meaningful, which of these has it become?
- Processed data
- Information (correct)
- Identifiable data
- Profiled data
Is the following data or information: "Sophie got 38 out of 40 on her English test"?
Is the following data or information: "Sophie got 38 out of 40 on her English test"?
- Information (correct)
- Data
Which one of the following best describes social engineering?
Which one of the following best describes social engineering?
- An automated attack on computing systems
- Cybercriminals stealing data through hacking into systems
- Websites deceiving humans into giving away personal data
- Humans using methods to trick or manipulate other humans into handing over information (correct)
"An attack that involves an attacker watching the victim while they provide sensitive information" is a description of which of the following?
"An attack that involves an attacker watching the victim while they provide sensitive information" is a description of which of the following?
You receive an email from an unknown source sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?
You receive an email from an unknown source sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?
Fill in the blanks regarding the definition of a Brute force attack: This is a form of (blank) that makes (blank) (blank) to (blank) something such as a (blank). Words to use: password, attempts, attack, discover, multiple
Fill in the blanks regarding the definition of a Brute force attack: This is a form of (blank) that makes (blank) (blank) to (blank) something such as a (blank). Words to use: password, attempts, attack, discover, multiple
Which of the following are principles that must be followed in the Data Protection Act 2018?
Which of the following are principles that must be followed in the Data Protection Act 2018?
Why is it called phishing, as in 'fishing'?
Why is it called phishing, as in 'fishing'?
What simple password rules would you set yourself to reduce the chance of a brute force attack being successful? Name two
What simple password rules would you set yourself to reduce the chance of a brute force attack being successful? Name two
What can you do to stop yourself from becoming a victim of a social engineering attack? Choose one type of attack and how to protect yourself.
What can you do to stop yourself from becoming a victim of a social engineering attack? Choose one type of attack and how to protect yourself.