1.
What is the name of the software developed jointly by the U.S. and Israel that damaged nearly one-fifth of Iran's nuclear centrifuges in 2010?
Correct Answer
D. Stuxnet
Explanation
Stuxnet was a sophisticated computer worm developed by the U.S. and Israel to sabotage Iran's nuclear program. Delivered via a USB drive, it targeted industrial control systems, causing damage to centrifuges. Its ability to infiltrate air-gapped systems showcased a new level of cyber warfare complexity.
2.
According to the 2014 Ponemon report, what was the average cost per record lost during a data breach in the United States?
Correct Answer
D. $300
Explanation
The 2014 Ponemon report revealed that data breaches cost organizations $201 per record lost, including $134 in indirect costs like customer churn. This figure highlights the financial impact of poor cybersecurity, underscoring the importance of robust data protection measures.
3.
According to Alberta's Freedom of Information and Privacy (FOIP) legislation, can the University collect personal information about you from external sources without your consent?
Correct Answer
B. False
Explanation
Under FOIP legislation, public bodies are required to collect personal information directly from individuals unless specific exceptions apply. This ensures transparency and accountability in handling sensitive data, protecting individual privacy rights.
4.
The Sandworm malware, distributed by Russian hackers, exploits a zero-day vulnerability in which Microsoft Office product?
Correct Answer
C. Microsoft Powerpoint
Explanation
Sandworm malware leverages a vulnerability in PowerPoint, using a malicious .INF file to download additional malware. This type of attack highlights the risks associated with unpatched software and underscores the need for regular updates.
5.
According to the University of Lethbridge Password Standard, how often should passwords be changed?
Correct Answer
A. 90 days
Explanation
The University of Lethbridge Password Standard mandates changing passwords every 90 days. This practice minimizes the risk of unauthorized access by reducing the likelihood of compromised credentials being exploited over extended periods.
6.
Is it recommended to reuse passwords on multiple sites?
Correct Answer
B. False
Explanation
Reusing passwords across sites poses a major security risk. If one site is breached, attackers could gain access to other accounts. Using unique passwords for each site mitigates this threat, enhancing overall online security.
7.
Is it acceptable to share your password with anyone, such as coworkers, friends, or IT staff?
Correct Answer
B. No
Explanation
Sharing passwords violates security protocols and exposes accounts to unauthorized access. Passwords should be confidential, as even trusted individuals may inadvertently compromise security. Strong policies emphasize non-disclosure to maintain system integrity.
8.
What is the correct definition of a computer worm?
Correct Answer
B. A standalone program that replicates itself to spread across networks (Correct Answer)
Explanation
A computer worm is a self-replicating malware program designed to spread across networks. Unlike viruses, worms do not require a host program, making them particularly dangerous for rapidly propagating malware attacks.
9.
A phishing attack or a communication asking a user to reveal sensitive information can prompt the user to:
Correct Answer(s)
A. Reply via email
B. Open a webpage to enter information
C. Open a file and send to a different location
D. Provide sensitive information over the pHone
Explanation
Phishing attacks employ various methods, such as emails, websites, file attachments, or phone calls, to trick users into divulging credentials. Vigilance and verification are critical to avoid falling victim to such scams.
10.
In a website's address, which prefix indicates that your communication is encrypted during transit?
Correct Answer
B. Https://
Explanation
The https:// prefix and lock symbol in the browser indicate that data is encrypted during transmission. While it reduces the risk of data interception, users should remain cautious about the website's legitimacy to ensure complete safety.