Social Engineering
Malicious Software
Data Loss, Theft, Manipulation
Methods of Protection
Exam Questions
100

What is social engineering?

The use of manipulation to trick individuals into disclosing confidential information

100

What is malware?

Malicious software designed to harm or exploit a system

100

What is the most common consequence of accidental data loss?

Inability to access important files or data

100

What is the purpose of encryption?

To scramble data to prevent unauthorised access

100

Give an example of how phishing can occur through SMS.

A fake text message pretending to be from a bank requesting login information

200

Name two social engineering techniques.

Blagging and phishing

200

Identify two types of malware.

Virus and ransomware

200

How can malicious damage impact a business?

It can result in data loss, financial loss, and reputational damage

200

How can antivirus software protect against malware?

It detects and removes malicious programs from the system

200

What is the difference between accidental and malicious data loss?

Accidental is unintentional, e.g., deleting a file; malicious is intentional, e.g., a hacker deleting data

300

How can shouldering be prevented?

Cover your screen or keypad while entering sensitive information

300

How does a Trojan horse infect a system?

It disguises itself as legitimate software but contains malicious code

300

Name a consequence of data theft for an individual.

Identity theft, financial fraud, or loss of personal data

300

Name a physical security measure that can prevent data theft.

CCTV, door locks, security guards

300

How can regular backups prevent data loss?

By creating copies of data that can be restored in case of data corruption or loss

400

How does baiting trick victims into giving away information?

By offering something enticing, like a free download, to lure them in

400

What is a keylogger?

Malware that records keystrokes to steal sensitive information

400

Explain how data manipulation can disrupt business operations.

It can alter financial records, leading to incorrect reporting and decision-making

400

Explain how firewalls work to prevent cyber attacks.

They monitor and filter incoming and outgoing network traffic based on security rules

400

Describe how a denial of service (DoS) attack works.

Overloads a system with traffic to prevent legitimate access

500

Explain why social engineering is considered a significant threat to information security.

It targets the human element, often exploiting trust and a lack of awareness, bypassing technological safeguards

500

Explain how spyware can lead to data theft.

It secretly monitors and collects user data, sending it to the attacker without the user’s knowledge

500

How can data breaches affect customer trust?

Customers may lose confidence in the company’s ability to protect their information, leading to a damaged reputation and potential loss of business

500

How can multi-factor authentication (MFA) enhance security?

It requires two or more verification methods, making unauthorized access more difficult

500

How can an organisation prepare for potential data breaches?

Implement security policies, conduct employee training, and develop a data recovery plan

M
e
n
u