Mock Flashcards

1
Q

The UK Goverment published a scheme in order to help businesses reach a good level of cyber security.

A

Cyber Essentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the best way to find the source of an intrusion in a network

A

Review the logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is it meant by a good cyber security user policy?

A

Disable the user accounts when the employee has left the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is it important to patch software?

A

To mitigate any found bugs and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which role is responsible in a company for a data breach?

A

CEO (Chief Executive Officer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How would a business make sure they are less likely to be a victim to a known software vulnerability?

A

Patch all software as soon as the patch is published by the software vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What standard must a company comply with if they want to take credit card payments on their websites?

A

PCI-DSS (Payment card industry data security standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the name of a collection of qualified and professional people who monitor network activity and device uptime.

A

NOC (Network Operations Centres)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the name of a collection of qualified and professional people who monitor network security activity and any possible intrusions.

A

SOC (Security Operations Centre)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the best method of protecting a companies IT estate

A

Make sure all staff are trained and comply with security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the UK, Who is the regulatory body that companies must report to if they are breached?

A

ICO (Information Commissioner Office)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of device would be used in a perimeter network security?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can a company do to protect themselves against this phishing?

A

Staff Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are small companies at risk for cyber crime?

A

Due to low cash flow in their business, they are unable to allocate a good % of their cash to “cyber security”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a method of trapping/testing to see if any cyber intruders are accessing your network.

A

Honey Pot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Should companies launch a counter-attack?

A

Absolutely Not

17
Q

Can broadband be patched?

A

Nope

18
Q

What standard should companies stick to in order to operate safely

A

ISO27001

19
Q

The third sector is made up of groups like the voluntary sector. Why would a company attack companies within this sector?

A

Identify theft

20
Q

What is it meant by data security

A

The security of data