Q.1
What is a policy that requires users to change passwords periodically?
  • password expiration
  • password encryption
  • password complexity
  • All of above
Q.2
When visiting a website, you notice a lock icon in the lower-right corner of the browser window. What does the lock represent?
  • A link to open another site
  • A webpage that has a secure connection
  • A program that prevents you from leaving the page
  • A warning that you are not allowed to view this webpage
Q.3
____ also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.
  • Cyber Security
  • Cyber Etiquette
  • Cyber Warfare
Q.4
What is the youngest age you can be charged of a Computer Misuse act offence?
  • 12
  • 14
  • 16
  • 18
Q.5
Which are examples of social engineering
  • Phishing
  • Disguising yourself as an employee to gain access to computer systems
  • Calling someone pretending to be IT support to steal confidential data
  • All of above
Q.6
Which are ways that an operating system can increase system security?
  • Offering the use of password protection
  • Different levels of user access
  • Keeping software updated
  • All of above
Q.7
What is the definition of a brute force attack?
  • Repeatedly trying usernames/passwords to access a system
  • Physically threatening someone to give up personal information
  • Physically breaking into a device to hack it
  • Being a very strong hacker
Q.8
Which apply to phishing?
  • Usually an attack made via email
  • Using a malicious medium, disguised as a trustworthy source, to get users to reveal personal information
  • Physically threatening someone until they give up personal data
  • Personally hacking someone to get personal information
  • Both A & B
Q.9
Which is not a type of anti-malware?
  • Anti-Virus
  • Anti-Spyware
  • Malware Scanner
  • Defragmenter
Q.10
Which of these are common methods that could be used to infect a computer with malware?
  • spam email
  • out of date firewall
  • Distributed denial of service
  • All of above
Q.11
Which are common types of malware?
  • Adware
  • Ransomware
  • Key Logger
  • All of above
Q.12
By combining the words 'malicious' and 'software' we get the word 'malware'. What does malicious mean?
  • Malicious means delicious.
  • Malicious means Mali Juice.
  • Malicious means harmful.
  • None of these
Q.13
Which of these is the most secure wifi username?
  • HiWiFi
  • HelloWiFi
  • WiFi
  • Doesn't matter
Q.14
Which of these were not the most common passwords of 2015
  • hello
  • 1234
  • Password
  • qwerty
Q.15
When do you need to use anti-virus software.
  • When you are sick.
  • When you are a doctor and give appointments
  • When you buy your first computer
  • All the time, in all devices and wireless connections to protect your devices.
Q.16
What can we use to protect our computer from hackers
  • fire wall
  • a picture which says "stay away"
  • Using a non approved VPN
  • all of the above
Q.17
What is the best password policy?
  • Always write the same passwords in every link
  • Your name, personal details
  • Have random password which you can't remember
  • Never use remember password and keep complex passwords you can remember
Q.18
Which of the following is a phishing email??
  • You have won a lottery!! Follow this link to claim it!!
  • Your bank account has been compromised. Login here to protect yourself.
  • Help.I am stuck aboard and urgently need money transferred to me to get home.
  • All of the above. Be careful.
Q.19
What is a Steganography
  • A Dinosaur
  • A Software that draws Graphs
  • A way of concealing text
  • A type of malware
Q.20
Who was the latest victim of cyber crime
  • British Airways
  • Foxconn
  • Google
  • Facebook
  • Snapchat
0 h : 0 m : 1 s