Q.1
Data Protection Actis designed to what?
  • To enable everyone to access all data
  • To protect personal data stored on computers or in an organised paper filing system
  • To allow people to use data systems where their details are stored
Q.2
If the integrity of data is compromised it means that?
  • It has been changed in some way
  • It has been copied
  • It has not been backed up
  • The legitimate user no longer has access to it
Q.3
The "C" in the CIA triad stands for
  • Communications
  • Compatibility
  • Confidentiality
Q.4
The "I" in the CIA triad stands for
  • Integrity
  • Intelligence
  • Independence
Q.5
The "A" in the CIA triad stands for
  • Accessibility
  • Advantage
  • Availability
Q.6
Plaintext + key = ______________.
  • Decoded
  • Ciphertext
  • Uncoded
Q.7
What is a hackers?
  • A hacker is someone who discovers the weaknesses of a computer or computer network
  • someone who helps others
  • a person who does not know how to turn on a computer
  • a person who spends a lot of time with his smartphone
Q.8
Personal Information
  • PII (Personally Identifiable Information)
  • TOE (Target of Evaluation)
  • OSINT (Open Source Intelligence)
  • Zero Day
Q.9
Open Source Intelligence
  • Hack Value
  • Daisy Chaining
  • PII
  • OSINT
Q.10
What does IoT stand for?
  • Internet of Types
  • Internet of Technologies
  • Internet over Telephone
  • Internet of Things
Q.11
What does GDPR stand for?
  • Great Danes Performance Ratings
  • General Data Protection Records
  • General Disclosure Protection Regulations
  • General Data Protection Regulation
Q.12
What type of ethical hack tests access to the physical infrastructure?
  • Internal network
  • Remote network
  • External network
  • Physical access
Q.13
What is the first phase of hacking?
  • Attack
  • Maintaining access
  • Gaining access
  • Reconnaissance
Q.14
Hacking for a cause is called:
  • Active hacking
  • Hacktivism
  • Activism
  • Black-hat hacking
Q.15
What is a Tabletop exercise?
  • A planned exercise allowed organisations to evaluate their response to a cyber attack
  • A dummy exercise with networking models on a Tabletop
  • A rehearsal cyber attack performed on a smaller organisation before attacking a large organisation
  • An authorised attack on a computer system
Q.16
How can you protect your computer against viruses?
  • Put a lock on it.
  • Install an anti-virus package, scan and delete files and update it.
Q.17
How does a worm infect a computer?
  • E-mail attachments
  • Through security loopholes, your computer is not up to date
  • Suspicious web links
  • On memory sticks
Q.18
MAC address spoofing is which type of attack?
  • Encryption
  • Brute-force
  • Authentication
  • Social engineering
Q.19
Set file permissions
  • chmod
  • mkdir
  • cat
  • cd
Q.20
What does RIPA stand for?
  • Regulation of Investigatory Powers Act
  • Regulation of Information Powers Act
  • Regulation of Investigatory Protection Act
  • Recovery of Investigatory Powers Act
  • Recovery of Information Powers Act
0 h : 0 m : 1 s