Which of the following is NOT a routine method to maintain cyber security?
1. Regularly updating software with security patches
2. Using strong and unique passwords for different accounts
3. Clicking on suspicious links in emails
4. Backing up important data
Using strong and unique passwords for different accounts
Network traffic refers to the:
1. Amount of data stored on a computer hard drive
2. Flow of data between devices on a network (e.g., emails, web browsing)
3. Number of users accessing a website
4. Security updates downloaded from the internet
Flow of data between devices on a network (e.g., emails, web browsing)
A firewall acts as a:
1. Physical barrier to protect a computer system
2. Software program that filters incoming and outgoing network traffic
3. Backup system for recovering lost data
4. Tool for detecting malware on a device (This is antivirus software)
Software program that filters incoming and outgoing network traffic
When creating strong passwords, it's recommended to:
1. Use short and simple passwords for easy memorisation
2. Include a combination of uppercase and lowercase letters, numbers, and symbols over 8 characters
3. Use the same password
4. Share your passwords with trusted colleagues
Include a combination of uppercase and lowercase letters, numbers, and symbols over 8 characters
When creating a user access control policy, it's important to:
1. Grant unnecessary access privileges to all users
2. Allow users to share their login credentials with colleagues
3. Define clear roles and permissions for different user types
4. Avoid providing user access control training
Define clear roles and permissions for different user types (e.g., admin vs.standard user)
Vulnerability testing involves:
1. Identifying and exploiting system vulnerabilities
2. Implementing security controls
3. Monitoring network traffic
4. Updating software
Identifying and exploiting system vulnerabilities
Why are cyber security information and maintenance records important?
1. To track user activity on social media
2. To assist in recovery efforts after a cyber attack and for faster troubleshooting
3. To monitor browsing history
4. None of the above
To assist in recovery efforts after a cyber attack and for faster troubleshooting
Firewalls can help to: (Select )
1. Grant unauthorised access attempts
2. Block unauthorised access attempts
3. Spread malware more easily within a network
4. Prevent the spread of malware within a network(by controlling incoming traffic)
Block unauthorised access attempts
Prevent the spread of malware within a network(by controlling incoming traffic)
Firewalls can be configured to:
1. Allow unrestricted access to all network traffic
2. Allow or block specific types of network traffic (e.g., port filtering)
3. Automatically download and install security updates
4. Encrypt all data stored on a computer (This is typically a separate function)
Allow or block specific types of network traffic (e.g., port filtering)
Encryption is a process that:
1. Makes data more susceptible to corruption
2. Makes data unreadable
3. Speeds up data transfer over a network
4. Identifies outdated software versions
Makes data unreadable (without a decryption key)
Penetration testing is best described as:
1. Updating software with security patches
2. Launching a controlled cyber attack to simulate a real attack and assess system security
3. Performing a system backup
4. Using antivirus software
Launching a controlled cyber attack to simulate a real attack and assess system security
User access control refers to:
1. The process of logging in to a computer system
2. The level of permissions assigned to a user for accessing data and systems
3. The type of device used to access a system
4. The security measures in place for online banking (This could be related to user access control)
The level of permissions assigned to a user for accessing data and systems
A disadvantage of using a firewall is that it can:
1. Completely protect against all cyber attacks
2. Slow down network performance slightly (due to traffic filtering)
3. Allow trusted malware to bypass its filters
4. Be easily disabled by anyone
Slow down network performance slightly (due to traffic filtering)
Vulnerability testing is most beneficial when:
1. Performed once a year
2. Conducted regularly and as part of an ongoing security strategy (to identify new vulnerabilities)
3. Left to be done by security professionals only
4. Not necessary if you have a good antivirus program (Antivirus focuses on malware, not system weaknesses)
Conducted regularly and as part of an ongoing security strategy (to identify new vulnerabilities)
Multi-factor authentication adds an extra layer of security by:
1. Requiring a strong password only
2. Combining a password with a one-time code or biometric verification (e.g., fingerprint)
3. Automatically logging users in after successful password entry
4. Disabling access to suspicious login attempts
Combining a password with a one-time code or biometric verification (e.g., fingerprint)
Security updates often include:
1. New features and functionalities only
2. Bug fixes unrelated to security
3. Fixes for bugs and security vulnerabilities
4. None of the above
Fixes for bugs and security vulnerabilities
Restricting user access can be achieved by:
1. Using the same password for all accounts
2. Assigning user roles with specific permissions (e.g., admin, user)
3. Disabling unused user accounts
4. All of the above
All of the Above
Strong and unique passwords are essential for:
1. Protecting email accounts only
2. Every account (email, online banking, social media, etc.)
3. Downloading software safely
4. Sharing online shopping details
Every account (email, online banking, social media, etc.)
Which of the following is NOT a common method for vulnerability testing?
1. Automated vulnerability scanning tools
2. Manual penetration testing by security experts
3. Real-world cyber attack simulations
4. Installing additional security software
Installing additional security software (This doesn't identify vulnerabilities, it protects against them)
When backing up data for cyber security purposes, it's important to:
1. Store backups on the same device as the original data
2. Regularly test backups to ensure they can be restored
3. Back up data only when you suspect a cyber attack might occur
4. Use outdated storage devices for backups
Regularly test backups to ensure they can be restored (Verifies functionality)
Patching in cyber security refers to:
1. Installing a new operating system
2. Fixing a specific security vulnerability in software
3. Updating all software on a system at once
4. Deleting unnecessary files from a computer
Fixing a specific security vulnerability in software
When creating a user access control system, it's important to:
1. Grant all users the same level of access
2. Allow users to share their login credentials
3. Assign permissions based on individual user needs (e.g., finance department needing access to financial data)
4. Avoid using multi-factor authentication
Assign permissions based on individual user needs (e.g., finance department needing access to financial data)
Which of the following is NOT a method for restricting user access control?
1. Limiting access to specific files and folders
2. Granting administrator privileges to all users (This would be the opposite of restricting access)
3. Disabling unused user accounts
4. Using time-based restrictions
Granting administrator privileges to all users (This would be the opposite of restricting access)
Firewalls can be categorised into different types. Which protects a single computer?
1. Packet filtering firewall
2. Hardware firewall (Built into a device's hardware)
3. Proxy firewall (This is a type of firewall that acts as an intermediary for network traffic)
4. Cloud-based firewall
Hardware firewall (Built into a device's hardware)
Regular backups can help:
1. Increase the risk of malware infection
2. Overcome/Mitigate the impact of ransomware attacks
3. Slow down computer performance significantly
4. All of these
Overcome/Mitigate the impact of ransomware attacks (by allowing data recovery)