No student devices needed. Know more
19 questions
Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access
True
False
Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe?
True
False
Weak Passwords, misconfigured access rights, removable media, unpatched or outdated software, social engineering techniques and malicious code are All cyber security threats to businesses and organisations?
True
False
qwerty is a Strong Password (i.e. not a cyber security risk)
True
False
Users should always change their default passwords and PINs on new electronic devices at work or at home?
True
False
Businesses should aim to detect vulnerabilities in their networks/computer systems?
True
False
Detecting Vulnerabilities in a computer system/network also includes employee behaviours and procedures?
True
False
Penetration Test is...the selling of a company's products in a particular market or area.
True
False
Penetration Test is...(also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
True
False
White box testing, testers are given no more information than any potential hacker may have
True
False
Black Box testing, testers are given no more information than any potential hacker may have
True
False
In white box testing, testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system
True
False
In black box testing, testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system
True
False
Black Hats’ are ethical hackers, employed to put their expertise to good in finding system vulnerabilities before the ‘Death Eaters’ abuse them
True
False
White Hats’ are ethical hackers, employed to put their expertise to good in finding system vulnerabilities before the Black Hats’ abuse them
True
False
Grey-hats’ fall somewhere in between black and white hats
Grey-hats will frequently seek out system vulnerabilities without authorisation from the system/networks owners.
True
False
Spetsnaz Helmet (Level 3) will protect any computer system from a cyber security headshot.
True
False
12345 is a Strong Password (i.e. not a cyber security risk)
True
False
family pets are Strong Password (i.e. not a cyber security risk)
True
False
Explore all questions with a free account