Cyber Security
The need for secure digital systems is more crucial than ever before. We rely on computerised systems and networks to collect, process, store and transfer vast amounts of data and to control critical systems such as water and power supplies. Business and e-commerce can be undertaken twenty-four hours a day, seven days a week and telecommunications enable us to keep in touch with family and friends and collaborate with colleagues at any time. Mobile devices offer us freedom and flexibility of where and how we learn and work prezzo kamagra 100 mg. However, for all the advantages that these systems offer us, some people have found ways to exploit them and this poses a threat to our safety and security in the real world, as much as in the cyber world לויטרה 20 מ”ג מחיר. To deal with this problem the cyber security industry is expanding at a rapid rate.
http://www.ocr.org.uk/Images/267352-unit-03-cyber-security.pdf
To pass this test and achieve a certificate you will need an 80% or higher pass rate.
Review your the progress at any time by clicking the test summary button, click on any question number to go to that question and review your answer, questions you have answered are highlighted green. All question numbers must be highlighted green to be able to finish the test.
Once you have completed the test and clicked on the finish button you will need to restart the test if you have failed.
Test Summary
0 of 30 Questions completed
Questions:
Information
You have already completed the test before. Hence you can not start it again.
Test is loading…
You must sign in or sign up to start the test.
You must first complete the following:
Results
Results
0 of 30 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Well done for completing the Cyber Security module.
If you have passed please download your certificate, if you have failed please read up on the course materials and retake the test when you are ready.
Why not now take one of the other modules here.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 30
1. Question
Cyber security processes, practices and technologies aim to protect information confidentiality, availability and ____________.
CorrectIncorrect -
Question 2 of 30
2. Question
What class of cyber incident is defined as “reviewing or reading data, information or systems documentation, without permission of the owner”?
CorrectIncorrect -
Question 3 of 30
3. Question
Which kind of theft is most likely to affect individuals?
CorrectIncorrect -
Question 4 of 30
4. Question
What type of attack is performed when a hacker exploits a bug or configuration flaw in a system to give themselves elevated access to the network and associated data and applications?
CorrectIncorrect -
Question 5 of 30
5. Question
Which type of cyber-attack aims to render services inaccessible by overloading the system with requests?
CorrectIncorrect -
Question 6 of 30
6. Question
A software security method that prevents a user from logging in after a set number of failed attempts is known as…
CorrectIncorrect -
Question 7 of 30
7. Question
Which type of cyber security victim do the following examples of data belong to? Meeting minutes, sales records, staff personnel information and planning documents.
CorrectIncorrect -
Question 8 of 30
8. Question
Which of the following is the act of or attempt of penetrating a country’s computer networks, for the purposes of causing disruption or damage by another country?
CorrectIncorrect -
Question 9 of 30
9. Question
Select the example of an accidental vulnerability.
CorrectIncorrect -
Question 10 of 30
10. Question
The rebellious use of computers, computer networks and the internet to promote a political agenda is known as…
CorrectIncorrect -
Question 11 of 30
11. Question
An unskilled individual who uses code or programs developed by others to attack computer systems and networks and deface websites are known as…
CorrectIncorrect -
Question 12 of 30
12. Question
What would be the motivation for a disgruntled ex-employee planning to commit a cyber-crime?
CorrectIncorrect -
Question 13 of 30
13. Question
Which type of target would be affected by malware embedded in an app?
CorrectIncorrect -
Question 14 of 30
14. Question
Which operational method of protection involves the public sharing of the encryption key but only the person receiving the data receives the private decryption key?
CorrectIncorrect -
Question 15 of 30
15. Question
Which piece of legislation makes the unauthorised access to computer systems, unauthorised access with intent to commit a further offence or unauthorised modification of data an offence?
CorrectIncorrect -
Question 16 of 30
16. Question
Select the example of a communications equipment asset.
CorrectIncorrect -
Question 17 of 30
17. Question
The identification of software issues and installing updates or hot fixes to remove a vulnerability is known as what?
CorrectIncorrect -
Question 18 of 30
18. Question
What is the device that monitors a network or system for malicious activity or policy violations and notifies the technical staff?
CorrectIncorrect -
Question 19 of 30
19. Question
What is the name given to the process of using an isolated environment where programs or files can be executed without affecting the system or network on which it runs?
CorrectIncorrect -
Question 20 of 30
20. Question
Select the answer that is one phase of the vulnerability management life cycle.
CorrectIncorrect -
Question 21 of 30
21. Question
Select the example of physical access control to data or systems.
CorrectIncorrect -
Question 22 of 30
22. Question
Cyber criminals can conceal information within an inconspicuous file. What is this process known as?
CorrectIncorrect -
Question 23 of 30
23. Question
Which organisational policy outlines how users should interact with a computer system in order to protect resources and information?
CorrectIncorrect -
Question 24 of 30
24. Question
Select the INCORRECT response to a cyber-incident.
CorrectIncorrect -
Question 25 of 30
25. Question
Which document lays out the processes and procedures to recover and protect the IT infrastructure of an organisation in the event of an incident?
CorrectIncorrect -
Question 26 of 30
26. Question
What IT function will enable a disaster recovery plan to restore normal functionality of a compromised system?
CorrectIncorrect -
Question 27 of 30
27. Question
Select the piece of information that would NOT be included in a cyber-security incident report.
CorrectIncorrect -
Question 28 of 30
28. Question
What is the purpose of the Cyber Security Information Sharing Partnership (CISP), Information Security Form (ISF), and Information Systems Audit Control Association (ISACA)?
CorrectIncorrect -
Question 29 of 30
29. Question
Which word means removing the elements of the incident from the system or network?
CorrectIncorrect -
Question 30 of 30
30. Question
What would you find at the end of an incident report?
CorrectIncorrect