Handling Computer Files II - SS2 ICT Past Questions and Answers - page 1
What is the primary purpose of basic file processing?
Manipulating hardware components
Organizing computer networks
Reading, writing, and manipulating data stored in files
Managing user interfaces
What is one of the effects of file insecurity?
Increased system performance
Enhanced data accessibility
Data leakage and unauthorized access
Improved software compatibility
Which method involves converting data into an unreadable format using a key?
Compression
Encryption
Decryption
Decompression
Which security measure helps monitor network traffic and prevents unauthorized access?
Encryption
Regular updates
Firewalls
File integrity checks
What does a firewall do?
Encrypts files during transmission
Monitors network traffic and prevents unauthorized access
Converts data into a readable format
Checks file integrity using hashing algorithms
What can unauthorized access to insecure files lead to?
Increased system performance
Enhanced data accuracy
Data leakage and privacy breaches
Better software compatibility
What does the process of hashing do?
Encrypts data for secure transmission
Monitors network traffic
Verifies the integrity of files
Decodes encrypted data
Which protocol is used for secure file transfers over networks?
FTP
HTTP
SFTP
TCP/IP
What is a common method of protecting files from unauthorized access?
Regularly sharing passwords
Storing files in public locations
Implementing access controls and permissions
Using simple and easily guessable passwords
What is the purpose of user education in file security?
Encrypting files
Enhancing system performance
Preventing data corruption
Promoting best security practices