Podcast
Questions and Answers
When data has been processed and is meaningful, which of these has it become?
When data has been processed and is meaningful, which of these has it become?
Is the following data or information: "Sophie got 38 out of 40 on her English test"?
Is the following data or information: "Sophie got 38 out of 40 on her English test"?
Which one of the following best describes social engineering?
Which one of the following best describes social engineering?
"An attack that involves an attacker watching the victim while they provide sensitive information" is a description of which of the following?
"An attack that involves an attacker watching the victim while they provide sensitive information" is a description of which of the following?
Signup and view all the answers
You receive an email from an unknown source sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?
You receive an email from an unknown source sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?
Signup and view all the answers
Fill in the blanks regarding the definition of a Brute force attack: This is a form of (blank) that makes (blank) (blank) to (blank) something such as a (blank). Words to use: password, attempts, attack, discover, multiple
Fill in the blanks regarding the definition of a Brute force attack: This is a form of (blank) that makes (blank) (blank) to (blank) something such as a (blank). Words to use: password, attempts, attack, discover, multiple
Signup and view all the answers
Which of the following are principles that must be followed in the Data Protection Act 2018?
Which of the following are principles that must be followed in the Data Protection Act 2018?
Signup and view all the answers
Why is it called phishing, as in 'fishing'?
Why is it called phishing, as in 'fishing'?
Signup and view all the answers
What simple password rules would you set yourself to reduce the chance of a brute force attack being successful? Name two
What simple password rules would you set yourself to reduce the chance of a brute force attack being successful? Name two
Signup and view all the answers
What can you do to stop yourself from becoming a victim of a social engineering attack? Choose one type of attack and how to protect yourself.
What can you do to stop yourself from becoming a victim of a social engineering attack? Choose one type of attack and how to protect yourself.
Signup and view all the answers