Module 3: Cybersecurity Flashcards
Q1: Which of the following is a key step in avoiding phishing scams?
A) Clicking on links immediately
B) Ignoring the sender’s details
C) Checking for a lock icon in the address bar
D) Forwarding the email to a friend
Answer: C
Q2: The “CIA” triad in cybersecurity stands for:
A) Confidentiality, Identity, and Authorization
B) Confidentiality, Integrity, and Availability
C) Cybersecurity, Integrity, and Authentication
D) Confidentiality, Information, and Access
Answer: B
Q3: Which of the following is NOT a recommended characteristic of a strong password?
A) Using personal information
B) Including symbols
C) Having at least 8 characters
D) Using a mix of uppercase and lowercase letters
Answer: A
Q4: When creating a password, it is advised to:
A) Use the same password for all accounts
B) Avoid changing it regularly
C) Use a password based on a sentence
D) Keep it simple and easy for others to guess
Answer: C
Q5: What type of data security level is used for information that could harm national security if disclosed?
A) Confidential
B) Restrict
C) Classified
D) Open
Answer: C
Q6: Which of the following describes “Integrity” in the context of cybersecurity?
A) Allowing all data to be publicly accessible
B) Protecting data from unauthorized modifications
C) Ensuring data is available only to NTU staff
D) Allowing external devices to connect freely to the system
Answer: B
Q7: To keep NTU’s data safe, it is recommended to:
A) Leave workstations unlocked
B) Use personal accounts to send work information
C) Follow a clean desk policy
D) Disable encryption on sensitive information
Answer: C
Q8: Which of the following teams at NTU is responsible for detecting and responding to cyber-attacks 24/7?
A) Cyber Security Governance
B) Cyber Security Engineering
C) Cyber Security Defense Team
D) Cyber Risk Management
Answer: C
Q9: According to NTU’s Acceptable IT Usage Policy (AIUP), which of the following is recommended?
A) Share your password with trusted friends
B) Use NTU email for official communications
C) Forward university documents to personal storage
D) Use Carbon Copy (CC) instead of BCC in mass emails
Answer: B
Q10: The “P” in NTU’s general cybersecurity advice acronym “PASS” stands for:
A) Privacy
B) Phishing
C) Passwords
D) Protocol
Answer: C
Q11: Which of the following is a good habit for cybersecurity according to NTU’s policy?
A) Disabling antivirus software
B) Frequently changing passwords
C) Sharing your password with colleagues
D) Turning off software updates
Answer: B
Q12: What is the main purpose of Multi-Factor Authentication (MFA)?
A) To allow multiple users to access an account
B) To enhance security by requiring additional verification steps
C) To make passwords longer
D) To store passwords in an encrypted format
Answer: B
Q13: Which type of data security level is intended for data that can be shared with the public?
A) Open
B) Confidential
C) Classified
D) Restrict
Answer: A
Q14: When sending mass emails, which method helps keep recipients’ identities confidential?
A) Using CC
B) Using BCC
C) Sending separate emails to each recipient
D) Sharing a public email link
Answer: B
Q15: Why is it important to lock your workstation when leaving your desk?
A) To improve computer performance
B) To prevent unauthorized access to sensitive information
C) To ensure automatic updates run smoothly
D) To reduce power consumption
Answer: B