Summative Assessment Answers: Cybersecurity
Summative Assessment Answers: Cybersecurity
Save a copy
1. Which UK law gives you the right to access the data an organisation stores on you?
2. When data has been processed and is meaningful, which of these has it become?
A. Information
B. Processed data
C. Identifiable data
D. Profiled
5. You receive an email from an unknown sender asking for money. The sender wants
you to respond to the email. There are no hyperlinks in the email, but it includes unusual
use of English and there are a number of spelling mistakes. What type of social
engineering attempt is this?
A. Shouldering
B. Phishing
Save a copy
C. Spam
D. Blagging
A. Hacking
B. Viruses
C. Social engineering
D. Phishing
8. What is the term for people who are paid to legally hack into computer systems with
the sole purpose of helping a company identify weaknesses in their system?
A. Ethical hackers
B. Legal hackers
C. Penetration testers (pen testers)
D. System administrators
10. Which of the following passwords would be the best defence against a brute force
attack?
A. peter1£@!
Save a copy
B. Petertherabbit
C. P3tertherabb1t
D. P$tertherabb1t
11. Which one of the following UK laws would a DDoS attack violate?
12. Which of the following are types of malware? Tick all that apply.
Trojans
Worms
Anti-virus
Firewall
Ransomware
14. Which of the following is a method of verifying that a login attempt has been made
by the account owner?
A. CAPTCHA
B. Two-factor authentication
C. Installing a firewall
D. Setting user permissions
15. Software that checks incoming and outgoing traffic on a network to check for
malicious code is known as what?
A. Anti-virus
B. Anti-malware
Save a copy
C. Firewall
D. Two-factor authentication
This resource is available online at ncce.io/cybs-saa. Resources are updated regularly — please check that
you are using the latest version.
This resource is licensed under the Open Government Licence, version 3. For more information on this
licence, see ncce.io/ogl.