31 questions
Which one of the following best describes the relationship between data & information?
Data & information are the same
Data is the raw input that information is based on
Information is unorganised data
Information is any data that is in digital form
Which one of the following best describes cybercrime?
Broadband connection with little or no access to the Internet
Theft of computers, smartphones or other devices.
Repeated failed attempts to log onto a PC
Illegal activities by means of computer networks
Which of the following is NOT a possible threat to data?
Employees
Service Providers
Screen resolution
Trojans
Which one of the following is an example of a threat to data from extraordinary circumstances?
Lost Password
Cracking
Fire
Cybercrime
Which one of the following is a typical threat to data from using Cloud Computing?
Shredding
Loss of privacy
Identity theft
Restricted access
Which one of the following is a typical threat to data from using Cloud Computing?
Shredding
Loss of privacy
Identity theft
Restricted access
______________ is a characteristic of information security that ensures the non disclosure of data except to another authorised person.
Confidentiality
Accessability
Intergrity
Availability
Which one of the following best describes why you should protect your personal information?
To prevent computer virus attacks
To protect the computer from defragmentation
To reduce the risk of identity theft
To avoid losing backed up data files.
Which one if the following best describes the reason for protecting commercially sensitive information?
To prevent theft of financial details
To prevent spread of malware
To prevent computer hardware errors
To prevent reduced broadband speed
Which one of the following is a main principle of data protection legislation?
To protect personal data
To protect technical data
To protect statistical data
to protect financial data
Which one of the following best describes a data subject?
An organisation who posts entries to social networking sites
An individual who provides their personal data to a data controller
An individual who carries out data processing
An organisation who encrypts data without a user's consent.
Which one of the following best describes how ICT guidelines are used in an organisation?
To provide Tax authorities with important up-to-date financial information
To inform customers about personal information protection
To provide employees with a set of rules that defines general computer use
To inform managers about training and competence status.
Which one of the following best describes the purpose of social engineering?
Pasword Cracking
Information gathering
Ethical Hacking
Networking Working
Which one of the following is a method of social engineering?
Creating accounts on several popular social networking sites
Uploading videos on a blog very frequently
Sending e-mails that falsely claims to be from a legitimate source
Linking to many websites from a social networking site
Which one of the following best describes a direct consequence of identity theft?
Your keycard may stop working
Your broadband connection may suffer from reduced speed
Your PC takes longer to start up
Your e-mail account may be accessed by others
Which one of the following is a method of identity theft?
Erasing
Skimming
Formatting
Uploading
Which one of the following best describes the effect of enabling an application to run macros?
Your PC will be more energy effective
Your PC will be more technically stable
Your PC will be more @ risk from viruses
Your PC will be more @ risk from power outages
Which one of the following is most likely to manage the authentication, authorisation and accounting within a PC network?
The IT support Staff
The network Admin
The IT manager
The CEO of the company
Which of the following best describes the quarantine in an anti-virus software?
Older virus definitions are stored here
Backup copies of the system files are stored here
Infected files that cannot be deleted/cleaned during scanning of the PC are stored here
All files that are being scanned by the software are stored here
Which of the following is needed when connecting to a protected wireless network?
Anti-virus software
Pop-Up blocker
Password
Firewall
Which of the following applications would you use to delete browsing history?
Microsoft Word
Microsoft Excel
Internet Explorer
Adobe Reader
Which of the following actions is most likely to spread malware?
Deleting a suspicious e-mail without opening it first
Receiving a cookie from a website you are on
Opening a e-mail attachment from an unknown sender
Setting up a firewall on your PC
What is cybercrime?
Broadband connection with little or no access to the Internet
Theft of computers/smartphone or other ICT devices
Repeated failed attempts to log onto a PC
Illegal activities by means of PC networks
Which of the following describes a Cookie?
A text file stored on the Hard Disk when a website is visited
A zip file
A text file saved as a Bookmark containing the website address
A file that serves as a shortcut to open a file/folder or an application
Which of the following best describes a known security vulnerability of IM?
Messages can shut down the firewall
Message text can be a virus in itself
Messages can disable the PC power supply
Message attachments can contain malware
Which one of the following best describes a one-time password?
A password that is valid only for a specific data and time
A password that is valid for only a one login session
A password that is used when restarting a PC
A password that is used when encrypting e-mail messages
Which one of the following best describes cracking?
Taking apart a PC to steal the hardware inside
Using software to find out system passwords
Sending unsolicited e-mail messages.
Downloading illegal software
What pat of https://www.security.org indicates that it is a secure website you are on?
www
security
.org
https
Which of the following does WEP stand for?
Wired Enabled Protection
Wi-Fi Enabled Policy
Wired Equivalent Privacy
Wi-Fi Equivalent Privacy
Which of the following should users be aware of when using Social Networking sites?
Encryption
Ethical Hacking
Grooming
Compressed Files
Which one of the following should you be aware of when using an unprotected wireless network?
Yout PC password will be changed
Encrypted files will be decrypted
Firewall protection will be disabled
Your data will be accessible to outsiders