1) Which of the following is not a actual hacker terminology ? Select which ever applicable a) White hat hacker b) Blue hat hacker c) Grey hat hacker d) Orange hat hacker 2) Which one of the following can protect a computer from the risk of unwanted emails? a) Anti-Spam software b) Anti-Virus software  c) Anti-Spyware software d) Anti-Cyberware  3) Which one of the following could lead to the spread of a malicious program? a) Using only software that has been checked for viruses. b) Maintaining regularly updated anti-virus software. c) Opening only virus-checked file attachments from known sources. d) Using a USB Flash Drive from an unknown source to exchange data. 4) Which one of the following describes why it is important to update antivirus software regularly? a) To protect your computer from all known viruses. b) To ensure the software identifies old and recent viruses. c) To protect your computer from unwanted bulk messages. d) To prevent the spread of malicious programs on the Internet. 5) Which one of the following statements about a password is TRUE? a) It must be changed only if it is compromised. b) It cannot contain special character symbols. c) It must be registered with the system administrator. d) It should be changed regularly. 6) Which one of the following would be considered the BEST way to store a PIN number? a) Keep a written note of it with your bank cards. b) Store it on your computer. c) Memorise it. d) Keep a written note of it in your office drawer. 7) Which one of the following is an example of phishing? a) An email warning the recipient of a computer virus threat. b) An email directing the recipient to forward the email to friends. c) An email directing the recipient to enter personal details on a fake website. d) An email directing the recipient to download an attachment. 8) Which one of the following describes a public network? a) A network where devices outside the network cannot see or communicate directly with computers on the network. b) A network where devices outside the network can see but cannot communicate directly with computers on the network. c) A network where devices outside the network can see and communicate directly with computers on the network. d) A network where devices outside the network cannot see but can communicate directly with computers on the network. 9) Which of the following should you do to restrict access to your files and devices? a) Update your software once a year b) Share passwords only with colleagues you trust c) Have your staff members access information via an open Wi-Fi network. d) Use multi-factor authentication 10) Backing up important files offline, on an external hard drive or in the cloud, will help protect your business in the event of a cyber attack. True or False? a) True b) False 11) Which is the best answer for which people in a business should be responsible for cybersecurity? a) Business owners. They run the business, so they need to know cybersecurity basics and put them in practice to reduce the risk of cyber attacks. b) IT specialists, because they are in the best position to know about and promote cybersecurity within a business. c) Managers, because they are responsible for making sure that staff members are following the right practices. d) All staff members should know some cybersecurity basics to reduce the risk of cyber attacks. 12) Attachments should always be treated with caution, even if you know the sender. a) True b) False 13) Which of the following would be the best password (hardest to crack)? a) Summ3r2017 b) iLm!J@c)&dl^A c) 12345678 d) t3chnologyRulz 14) When visiting your favorite website, a pop-up appears that reads "You have won a free Apple iPod!" What should you do? a) Click the pop-up, enter your information and claim the prize b) Do not click the pop-up - close it, and if possible, report it to an administrative c) Share the link with all your friends and family so that they too can get free stuff d) contact on the page you were on 15) What is the only true guarantee against data loss due to a cyberattack such as ransomware? a) My business is small - this isn't something I need to worry about b) Having enough money to pay the ransom c) Having anti-virus software d) Having my data backed up and accessible   16) Which of these is a possible cause of a data disaster? a) A Cyber-attack b) A lightning strike c) Broken Screen d) A hurricane e) Equipment failure f) A lost or stolen device or laptop

Leaderboard

Visual style

Options

Switch template

Continue editing: ?