Cyber Essentials sample questions to help you pass like a boss

Jan 27, 2022

Do you know your AV from your APT? Test your security know-how with our Cyber Essentials sample questions. (Yes, it's a bit like cheating on an exam. Shhh.)

Do you know your AV from your APT? Test your security know-how with our Cyber Essentials sample questions. (Yes, it's a bit like cheating on an exam. Shhh.)

You can take the title of this post with a pinch of salt. If you're considering becoming Cyber Essentials certified, you probably are a boss, technically speaking.

That's brilliant – the fact you're considering it, we mean. It's great that you're a boss too. Well done.

Ahem… let's start again.

The fact is, Cyber Essentials certification is tricky for any business to achieve without assistance. You could be the best IT manager on this side of the equator, and you'd still have to pause for thought.

It requires lots of preparation, and a keen understanding of your current security infrastructure – right down to the personal devices your employees use for work.

(Psst…
we can help with all this. But more on that later.)

We know it can be daunting when you're not sure what a process like this entails. Heck, we're getting flashbacks to our GCSEs just thinking about it. That's why we're going to share some sample questions with you, as well as a few definitions to help you navigate the complex world of cybersecurity.

Quick disclaimer. These aren't
exactly what you'll see on the Cyber Essentials assessment, but they're certainly indicative of the kinds of subjects covered.

And if you need a quick refresher on Cyber Essentials and Cyber Essentials Plus,
check out our service page. / OR "check out this nifty blog post."

OK. See-through pencil cases at the ready? Let's do this.

Do you have a documented password policy that includes a process for when you believe the passwords or accounts have been compromised?

What this means: this question is encouraging you to consider the implications of a password breach and to ask yourself whether you'd be equipped to cope.

What to ask yourself: "do all IT staff and users should know exactly what to do when a breach occurs?" This is essential so that potential damage can be limited without delay. And remember: passwords are only one tool in your security arsenal. Additional measures like two-factor authentication can add an extra level of protection if password data is leaked or compromised.

Do you have software firewalls enabled on all of your desktop computers, laptops and servers?

What this means: a firewall is like a nightclub bouncer for your network. It prevents unwanted traffic flowing between an untrusted network (i.e. the internet) and a trusted network (your office LAN).

What to ask yourself: "am I aware of all the devices used throughout my business?" You need to be certain that every internet-capable device is protected from internet threats using a properly-configured firewall.

Are all high-risk or critical security updates for operating systems and firmware installed within 14 days of release?


What this means: updates are released for a reason. Online security is constantly developing, and new vulnerabilities are discovered regularly. Keeping your software up to date means protecting yourself from the latest threats.

What to ask yourself: "am I keeping a record of the update status of all operating systems and software used throughout my business?" Remember: one missed update is all it takes for your whole network to be compromised.

Cybersecurity definitions

Now that you've got to grips with the kinds of questions you'll face, let's take a look at some of the acronyms that get thrown around in cybersecurity circles.

Of course, we'd never use jargon like this – we always aim to keep things clear and easy to understand. However, you might come across some of it while conducting your own research.

APT: Advanced Persistent Threat

A sophisticated, ongoing cyber attack. Most attacks are pretty basic, but an APT is meant to crack even the most advanced security infrastructures. The good news is that these are relatively rare, and are typically conducted by state-sponsored espionage groups.

AV: Antivirus

Software that detects and removes malware. We should all be familiar with antivirus programs. If you're not… install one, quick!

CIS: Center for Internet Security

A US non-profit that develops best-practice solutions to combat cyber threats. It's based in New York, but its work has global implications.

DDoS: Distributed Denial of Service

A kind of cyber attack that works by "flooding" a network with unwanted traffic. The aim is to overload the network and take it offline. Reports claim this kind of attack recently affected the
whole of North Korea.

HTTPS: Hypertext Transfer Protocol (Secure)

HTTP (without the "S") is the tech that the internet was founded upon. It's the thing that makes websites work, basically. The secure version began seeing more use from around 2016. By now,
all websites should use HTTPS.

ISO: International Organisation for Standardisation

The world's premier developer of commercial, technical and industrial standards. It's responsible for
ISO 27001, the top international standard for cybersecurity.

SSO: Single Sign-On

A system that allows users to log in to multiple services using one set of credentials. An example of this is when a website allows you to log in using your Facebook or Google account.

VPN: Virtual Private Network

A system that encrypts your internet traffic and hides your IP address, no matter what network you're connected to. A VPN is useful for connecting to unsecured public access points.

What to do next

In terms of questions, we've only scratched the surface. Our
Cyber Essentials sample quiz includes a few more, and scores you on your security to boot.

But more to the point,
you don't have to be a security expert to gain your certification. If you sign up with Yoozoom, we'll work closely with your team to make sure all your systems are up to scratch.

We're not like most organisations that offer cybersecurity certification. We don't simply send you the questions and put our feet up – we go the extra mile to make sure you pass with flying colours.

Plus, because we're an
IT company through and through, we know the tips and tricks that ensure long-term protection for your business.

Interested?
Book a no-obligation chat today, or read our Cyber Essentials page for a complete run-down of how our service works.


(P.S. fancy signing up for our
Knowledge Hub? We'll send you genuinely useful tech and security advice by email. No spam, guaranteed.)

by Matthew Dickinson 21 Oct, 2024
We’re excited to announce that Yoozoom has officially joined the Windsor Telecom family as part of their mission to grow and expand across the UK. As a Leeds-based leader in unified communications, IT services, and networking solutions, Yoozoom has a proud legacy of helping businesses thrive. What does this mean for Yoozoom customers? Yoozoom will continue to provide the same high-quality services you know and trust. Windsor Telecom is committed to investing in our team and services, ensuring that we’re able to offer even more to our customers as part of a larger national network. A message from Windsor Telecom: "We’re thrilled to welcome the Yoozoom team and customers into the Windsor Telecom family,” said Pete Tomlinson, CEO of Windsor Telecom. “Their expertise will be invaluable as we grow our national presence, helping even more businesses use technology to deliver outstanding customer and employee experiences.” As part of Windsor Telecom’s UK-wide growth plan, Yoozoom is excited to embark on this next chapter and continue to deliver innovative solutions that make a difference. Stay tuned for more updates as we continue to evolve as part of the Windsor Telecom Group!
Small business owner? Need a new phone system? This is the guide for you.
by Simon Edward 26 Sept, 2022
Small business owner? Need a new phone system? This is the guide for you. Learn how to find a VoIP phone system that helps you smash your goals.
By 2025, all UK phone systems will be cloud-based.
by Simon Edward 19 Sept, 2022
By 2025, all UK phone systems will be cloud-based. If you're reluctant to switch sooner rather than later, read on for six advantages of a VoIP system.
Ten years ago, Skype was everywhere. Now… not so much. But what happened, exactly?
by Simon Edward 12 Sept, 2022
Ten years ago, Skype was everywhere. Now… not so much. But what happened, exactly? Read on to discover the truth behind Skype's rise and fall.
94% of all enterprises use cloud services – but do 94% know enough about cloud security?
by Simon Edward 05 Sept, 2022
94% of all enterprises use cloud services – but do 94% know enough about cloud security? Read on to find out more about staying safe in the cloud.
Do you even NEED two mobile phones for work?
by Simon Edward 22 Aug, 2022
Is it time to ditch the company mobile? We weigh up the pros and cons – and explore a third option that could save you cash and hassle.
Want to outsource IT support? Scratching your head over the options?
by Simon Edward 15 Aug, 2022
Want to outsource IT support? Scratching your head over the options? Choose the right IT company, first time, with our 5-step guide.
What is the true cost of an IT failure?
by Brian Rosten 08 Aug, 2022
IT failures cost more than you might think. Learn three ways to calculate the true cost of a failure and safeguard your business from tech disasters.
Time's running out – are you ready for BT's
by Simon Edward 02 Aug, 2022
In 2025, BT will switch off its ISDN and PSTN phone lines for good. Is your business ready for the change? Learn what's happening and what to do.
Learn 4 big reasons why phishing attacks work, as well as some useful tips to help you safeguard you
by Simon Edward 25 Jul, 2022
Phishing is on the rise. Learn 4 big reasons why phishing attacks work, as well as some useful tips to help you safeguard your business.
More posts
Share by: