What is the main purpose of the Privacy Act 1988?
Privacy protection
What type of encryption uses the same key to both encrypt and decrypt data?
Symmetric encryption
What type of cipher shifts letters by a fixed number?
Caesar cipher
What type of threat floods a network to make it unavailable?
DoS attack
What security tool scans and removes malicious software?
Anti-malware
What does Australian Privacy Principle (APP) 11 require organisations to do?
Take reasonable steps to protect personal data from misuse, loss, and unauthorised access.
What makes asymmetric encryption more suitable than symmetric for exchanging data securely over the internet?
Key pair system/public+private key
What attack checks all possible keys until the correct one is found?
Brute force
Which network threat can occur even when a user is connected to a secure-looking (HTTPS) site and doesn’t realize the data is being intercepted?
Man-in-the-middle
What device controls incoming and outgoing network traffic based on rules?
Firewall
How is ethical hacking different from malicious hacking?
Permission
Which key is used to encrypt data that only the receiver can decrypt?
Receiver’s public key
What technique is often used to break substitution ciphers?
Frequency analysis
What type of attack exploits a website’s failure to validate or sanitize user input, allowing attackers to run database commands?
SQL injection
What is the purpose of an access control list (ACL) in a network?
Restrict access
What role does a red team play in penetration testing?
Simulate attacks
What ensures the sender of a message is authentic in asymmetric encryption?
Digital signature
What is the name of a modern symmetric encryption algorithm widely used today?
AES
What makes zero-day vulnerabilities difficult to defend against?
Unknown flaw
What type of system monitors and blocks suspicious activity in real-time?
Intrusion prevention system
Why might an organisation be legally required to notify the public after a data breach?
NDB scheme (privacy amendment)
What allows a user to verify that a public key belongs to a trusted entity?
Certificate authority
What encryption algorithm uses large prime numbers and is asymmetric?
RSA
How can compromised credentials lead to both internal and external threats simultaneously?
External access as insider
How does regular user training reduce the effectiveness of social engineering attacks?
Prevent human error