Q.1
If a website is using HTTPS it means that...
  • Data sent and received is encrypted
  • Data sent and received can be viewed by others
  • Data received is encrypted
  • Data sent is encrypted
Q.2
______________ is way of protecting internet-connected systems, including: hardware, software and data, from cyberattacks
  • Cyber Security
  • Cyber Safe
  • SPAM
  • DDOS
Q.3
What do we use a SPAM filter for?
  • To arrange emails in order by name
  • To prevent common scams
  • To attach a file to an email
  • To scan an email for viruses
Q.4
Qwertyis a Strong Password (i.e. not a cyber security risk)
  • True
  • False
Q.5
Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe?
  • True
  • False
Q.6
If testers have little to no information regarding the system they are trying to hack they are:
  • White box testing
  • Yellow box testing
  • Black box testing
  • Blue box testing
Q.7
What type of program can you install to prevent malware?
  • Antivirus software
  • Office software
  • A new operating system
  • A disk defragmenter
Q.8
Which of these will not put you at risk of malware attacks?
  • Opening email attachments from unknown sources.
  • Downloading pirate movies from torrent services
  • Not installing updates for your operating system
  • Using a free operating system like Linux, as opposed to using Windows
Q.9
What should a strong password include?
  • At least one upper case letter
  • At least 8 characters
  • At least one number
  • All of above
Q.10
What is blagging?
  • Observing a person's private info over their shoulder
  • Cyber attack to redirect a website's traffic to another, fake site
  • Inventing a scenario to target someone into divulging information
  • A virus that registers key strokes
Q.11
What does DDOS stand for?
  • Denial Data Operation System
  • Domain Data Overwrite Service
  • Distributed Domain Or Service
  • Distributed Denial Of Service
Q.12
Which one of the following is NOT a type of CyberSecurity Attack?
  • Worms
  • Randsomware
  • Spyware
  • Password Management
Q.13
Viruses, worms, and trojans are common security threats that are often used in spreading. What is the name for them all?
  • Malware
  • Formalware
  • Scams
  • The Spreading attackers
Q.14
How did the reporters gain access to peoples voicemail in mobile phone hacking scandal in 2012?
  • They spoke to the victoms
  • They hacked their computers
  • They tried using the default PIN number which was frequently unchanged
  • They used white box testing
Q.15
What should you look out for when reading emails
  • All of above
  • Poor spelling and grammar
  • Sender's email
  • Request for personal information
Q.16
Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access
  • True
  • False
Q.17
What is a Trojan malware?
  • A type of malware that appears to be a legitimate program, but actually causes harm
  • A type of malware that deletes programs on the system each time replacing them with itself
  • A type of malware that spies on users without their knowledge
  • A type of malware that removes and sends all of your files to a third party, over time so you don't notice
Q.18
What does malicious mean?
  • Something intended to do harm
  • Something that makes you ill
  • Something good
  • Tasty
Q.19
Thomas never discloses personal information when using the internet, what is he practicing?
  • Online Shopping
  • Cyber-Security
  • Cyber bullying
  • Online gaming
Q.20
Why is it important to protect your identity online?
  • Because being online is a safe environment
  • Because everyone does it
  • Because someone might steal your personal information.
  • Because your parents told you to
0 h : 0 m : 1 s