Module 3: Cybersecurity Flashcards

1
Q

Q1: Which of the following is a key step in avoiding phishing scams?
A) Clicking on links immediately
B) Ignoring the sender’s details
C) Checking for a lock icon in the address bar
D) Forwarding the email to a friend

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q2: The “CIA” triad in cybersecurity stands for:
A) Confidentiality, Identity, and Authorization
B) Confidentiality, Integrity, and Availability
C) Cybersecurity, Integrity, and Authentication
D) Confidentiality, Information, and Access

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q3: Which of the following is NOT a recommended characteristic of a strong password?
A) Using personal information
B) Including symbols
C) Having at least 8 characters
D) Using a mix of uppercase and lowercase letters

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q4: When creating a password, it is advised to:
A) Use the same password for all accounts
B) Avoid changing it regularly
C) Use a password based on a sentence
D) Keep it simple and easy for others to guess

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q5: What type of data security level is used for information that could harm national security if disclosed?
A) Confidential
B) Restrict
C) Classified
D) Open

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q6: Which of the following describes “Integrity” in the context of cybersecurity?
A) Allowing all data to be publicly accessible
B) Protecting data from unauthorized modifications
C) Ensuring data is available only to NTU staff
D) Allowing external devices to connect freely to the system

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q7: To keep NTU’s data safe, it is recommended to:
A) Leave workstations unlocked
B) Use personal accounts to send work information
C) Follow a clean desk policy
D) Disable encryption on sensitive information

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q8: Which of the following teams at NTU is responsible for detecting and responding to cyber-attacks 24/7?
A) Cyber Security Governance
B) Cyber Security Engineering
C) Cyber Security Defense Team
D) Cyber Risk Management

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q9: According to NTU’s Acceptable IT Usage Policy (AIUP), which of the following is recommended?
A) Share your password with trusted friends
B) Use NTU email for official communications
C) Forward university documents to personal storage
D) Use Carbon Copy (CC) instead of BCC in mass emails

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q10: The “P” in NTU’s general cybersecurity advice acronym “PASS” stands for:
A) Privacy
B) Phishing
C) Passwords
D) Protocol

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q11: Which of the following is a good habit for cybersecurity according to NTU’s policy?
A) Disabling antivirus software
B) Frequently changing passwords
C) Sharing your password with colleagues
D) Turning off software updates

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q12: What is the main purpose of Multi-Factor Authentication (MFA)?
A) To allow multiple users to access an account
B) To enhance security by requiring additional verification steps
C) To make passwords longer
D) To store passwords in an encrypted format

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q13: Which type of data security level is intended for data that can be shared with the public?
A) Open
B) Confidential
C) Classified
D) Restrict

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q14: When sending mass emails, which method helps keep recipients’ identities confidential?
A) Using CC
B) Using BCC
C) Sending separate emails to each recipient
D) Sharing a public email link

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q15: Why is it important to lock your workstation when leaving your desk?
A) To improve computer performance
B) To prevent unauthorized access to sensitive information
C) To ensure automatic updates run smoothly
D) To reduce power consumption

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q16: In NTU’s cybersecurity policy, what does “Availability” mean?
A) Ensuring only IT staff can access data
B) Protecting data from modification
C) Ensuring data is accessible and usable when needed
D) Allowing external users to access NTU’s internal data

A

Answer: C

17
Q

Q17: Which of these is a component of NTU’s Cyber Security Governance?
A) Developing cyber policies and standards
B) Installing antivirus software on student devices
C) Enabling automatic logout on personal devices
D) Creating a public database for all NTU data

A

Answer: A

18
Q

Q18: Which action should be avoided when handling NTU’s sensitive digital information?
A) Encrypting data
B) Sending it via NTU email
C) Storing it on personal, unsecured drives
D) Using secure organizational accounts for transfer

A

Answer: C

19
Q

Q19: Which of the following practices contributes to strong data security?
A) Storing personal files on NTU’s public server
B) Forwarding university documents to your private email
C) Locking your workstation when unattended
D) Using easy-to-remember passwords

A

Answer: C

20
Q

Q20: When dealing with potential phishing emails, which is a correct approach?
A) Forward the email to colleagues for verification
B) Immediately click on the provided link to confirm its authenticity
C) Report the email to ServiceNow@NTU
D) Delete the email without checking the sender

A

Answer: C