Round 1
Round 2
Round 3
Round 4
Round 5
100

Which of the following is NOT a routine method to maintain cyber security?

1. Regularly updating software with security patches
2. Using strong and unique passwords for different accounts
3. Clicking on suspicious links in emails
4. Backing up important data

Using strong and unique passwords for different accounts

100

Network traffic refers to the:

1. Amount of data stored on a computer hard drive
2. Flow of data between devices on a network (e.g., emails, web browsing)
3. Number of users accessing a website
4. Security updates downloaded from the internet

Flow of data between devices on a network (e.g., emails, web browsing)

100

A firewall acts as a:

1. Physical barrier to protect a computer system
2. Software program that filters incoming and outgoing network traffic
3. Backup system for recovering lost data
4. Tool for detecting malware on a device (This is antivirus software)

Software program that filters incoming and outgoing network traffic

100

When creating strong passwords, it's recommended to:

1. Use short and simple passwords for easy memorisation
2. Include a combination of uppercase and lowercase letters, numbers, and symbols over 8 characters
3. Use the same password
4. Share your passwords with trusted colleagues

Include a combination of uppercase and lowercase letters, numbers, and symbols over 8 characters

100

When creating a user access control policy, it's important to:

1. Grant unnecessary access privileges to all users
2. Allow users to share their login credentials with colleagues
3. Define clear roles and permissions for different user types
4. Avoid providing user access control training

Define clear roles and permissions for different user types (e.g., admin vs.standard user)

200

Vulnerability testing involves:

1. Identifying and exploiting system vulnerabilities
2. Implementing security controls
3. Monitoring network traffic
4. Updating software

Identifying and exploiting system vulnerabilities

200

Why are cyber security information and maintenance records important?

1. To track user activity on social media
2. To assist in recovery efforts after a cyber attack and for faster troubleshooting
3. To monitor browsing history
4. None of the above

To assist in recovery efforts after a cyber attack and for faster troubleshooting

200

Firewalls can help to: (Select )

1. Grant unauthorised access attempts
2. Block unauthorised access attempts
3. Spread malware more easily within a network
4. Prevent the spread of malware within a network(by controlling incoming traffic)

Block unauthorised access attempts

Prevent the spread of malware within a network(by controlling incoming traffic)

200

Firewalls can be configured to:

1. Allow unrestricted access to all network traffic
2. Allow or block specific types of network traffic (e.g., port filtering)
3. Automatically download and install security updates
4. Encrypt all data stored on a computer (This is typically a separate function)

Allow or block specific types of network traffic (e.g., port filtering)

200

Encryption is a process that:

1. Makes data more susceptible to corruption
2. Makes data unreadable
3. Speeds up data transfer over a network
4. Identifies outdated software versions

Makes data unreadable (without a decryption key)

300

Penetration testing is best described as:

1. Updating software with security patches
2. Launching a controlled cyber attack to simulate a real attack and assess system security
3. Performing a system backup
4. Using antivirus software

Launching a controlled cyber attack to simulate a real attack and assess system security

300

User access control refers to:

1. The process of logging in to a computer system
2. The level of permissions assigned to a user for accessing data and systems
3. The type of device used to access a system
4. The security measures in place for online banking (This could be related to user access control)

The level of permissions assigned to a user for accessing data and systems

300

A disadvantage of using a firewall is that it can:

1. Completely protect against all cyber attacks
2. Slow down network performance slightly (due to traffic filtering)
3. Allow trusted malware to bypass its filters
4. Be easily disabled by anyone

Slow down network performance slightly (due to traffic filtering)

300

Vulnerability testing is most beneficial when:

1. Performed once a year
2. Conducted regularly and as part of an ongoing security strategy (to identify new vulnerabilities)
3. Left to be done by security professionals only
4. Not necessary if you have a good antivirus program (Antivirus focuses on malware, not system weaknesses)

Conducted regularly and as part of an ongoing security strategy (to identify new vulnerabilities)

300

Multi-factor authentication adds an extra layer of security by:

1. Requiring a strong password only
2. Combining a password with a one-time code or biometric verification (e.g., fingerprint)
3. Automatically logging users in after successful password entry
4. Disabling access to suspicious login attempts

Combining a password with a one-time code or biometric verification (e.g., fingerprint)

400

Security updates often include:

1. New features and functionalities only
2. Bug fixes unrelated to security
3. Fixes for bugs and security vulnerabilities
4. None of the above

Fixes for bugs and security vulnerabilities

400

Restricting user access can be achieved by:

1. Using the same password for all accounts
2. Assigning user roles with specific permissions (e.g., admin, user)
3. Disabling unused user accounts
4. All of the above

All of the Above

400

Strong and unique passwords are essential for:

1. Protecting email accounts only
2. Every account (email, online banking, social media, etc.)
3. Downloading software safely
4. Sharing online shopping details

Every account (email, online banking, social media, etc.)

400

Which of the following is NOT a common method for vulnerability testing?

1. Automated vulnerability scanning tools
2. Manual penetration testing by security experts
3. Real-world cyber attack simulations
4. Installing additional security software

Installing additional security software (This doesn't identify vulnerabilities, it protects against them)

400

When backing up data for cyber security purposes, it's important to:

1. Store backups on the same device as the original data
2. Regularly test backups to ensure they can be restored
3. Back up data only when you suspect a cyber attack might occur
4. Use outdated storage devices for backups

Regularly test backups to ensure they can be restored (Verifies functionality)

500

Patching in cyber security refers to:

1. Installing a new operating system
2. Fixing a specific security vulnerability in software
3. Updating all software on a system at once
4. Deleting unnecessary files from a computer

Fixing a specific security vulnerability in software

500

When creating a user access control system, it's important to:

1. Grant all users the same level of access
2. Allow users to share their login credentials
3. Assign permissions based on individual user needs (e.g., finance department needing access to financial data)
4. Avoid using multi-factor authentication

Assign permissions based on individual user needs (e.g., finance department needing access to financial data)

500

Which of the following is NOT a method for restricting user access control?

1. Limiting access to specific files and folders
2. Granting administrator privileges to all users (This would be the opposite of restricting access)
3. Disabling unused user accounts
4. Using time-based restrictions

Granting administrator privileges to all users (This would be the opposite of restricting access)

500

Firewalls can be categorised into different types. Which protects a single computer?

1. Packet filtering firewall
2. Hardware firewall (Built into a device's hardware)
3. Proxy firewall (This is a type of firewall that acts as an intermediary for network traffic)
4. Cloud-based firewall

 Hardware firewall (Built into a device's hardware)

500

Regular backups can help:

1. Increase the risk of malware infection
2. Overcome/Mitigate the impact of ransomware attacks
3. Slow down computer performance significantly
4. All of these

Overcome/Mitigate the impact of ransomware attacks (by allowing data recovery)

M
e
n
u