Daily Multiple Choice Test

Purchasing a virus to use as part of an attempt to steal personal data from a victim machine is a breach of which law
Computer Misuse Act Section 3
Computer Misuse Act Section 3ZA
Data Protection Act Section 4
Digital Weapons Act Section 1
Computer Misuse Act Section 3
Who does GDPR apply to
any business selling goods/services to the EU
only EU countries
All countries
The UK
any business selling goods/services to the EU
what does it mean when a server uses SSHv1.99
The server supports SSHv1.0 and SSHv2.0
The server supports SSHv1.99
The server supports any SSH version
The server is using a proprietary version of SSH
The server supports SSHv1.0 and SSHv2.0
a SYN Scan requires what level of privilege
root
user
service
admin
root
On conviction on indictment, what is the maximum prison sentence for a breach of Section 2 of the CMA
5 years
2 years
12 years
10 years
5 years
In SNMP what does a MIB stand for
Management Information Base
Memory In Byte
Module Information Baseline
Mode In Beta
Management Information Base
What year was the Computer Misuse Act created
1990
1998
2018
2000
1990
For section 2 of the computer misuse act to have been broken the following is true
The crime conducted after the unauthorised access does not *have* to use a computer
The crime conducted after the unauthorised access *has* to use a computer
The crime conducted after the unauthorised access has to be conducted by the same person
There must be a negative impact to a computer or data for a breach of CMA section 2
The crime conducted after the unauthorised access does not *have* to use a computer
Which of the following types of memory is non-volatile?
Hard drive
Cache
RAM
Register
Hard drive
In an environment using Dynamic Access control, who controls access to assets?
Asset owners
A central authority
No-one, all users can access all assets
The CEO
Asset owners
Your Score
Score Label
Score Summary