You are on page 1of 2

CYBERSECURITY

1. Which piece of software is not malware?


a) Trojan
b) Virus
c) Firewall
2 . Which of these is the strongest password?
a) BBCbitesize
b) BBCb1t£s1z#
c) BBCb1tes1z3
3. Why is it not advisable for a person to plug in a USB memory stick they
found?
a) It would be illegal
b) It might not fit their device
c) It might contain malware
4 .What is the purpose of patching software?
a) It updates software to make it take up less space
b) It updates software to fix bugs or add features
c) It updates software to change its coding language
5.What is black-box penetration testing?
a) A form of software testing used to simulate an external hacking attempt
b) A form of software testing used to simulate an internal hacking attempt
c) A form of software testing used to identify the strengths of a computer
system
6 .Which of the following is an example of pharming?
a) Someone getting an email asking them to help a friend who lost their
money
b) Someone receiving an email with a link pretending to be from a business
c) Someone visiting a website that redirects them to a fake site
7.Why is a Trojan malware program known by this name?
a) It hides inside a piece of software that appears to be a normal program
b) It’s a strong piece of software that is difficult to attack
c) It hides inside an email and contains malware
9. Which type of threat attempts to blackmail a user into making a payment to a
hacker?
a) Ransomware
b) Trojan
c) Spyware
10. Which social engineering technique uses emails to try to trick users into
giving away personal details?
a) Shouldering
b) Phishing
c) Spying

11. Name any three social engineering techniques.


12. Explain:
a. Pharming
b. Phishing
c. Virus
d. Trojan Horse
13. How will you protect data from malware?
14. Write any two rules for creating a stronger password.

You might also like