Security and Ethics - SS3 ICT Past Questions and Answers - page 1

1

What is a common source of security breaches?

View related lesson
A

Viruses

B

Firewalls

C

Software updates

D

Hardware maintenance

Ask EduPadi AI for a detailed answer

Share this question

2

What is a common source of security breaches?

View related lesson
A

Viruses

B

Firewalls

C

Software updates

D

Hardware maintenance

Ask EduPadi AI for a detailed answer

Share this question

3

Which type of malware replicates and spreads to other files or programs?

View related lesson
A

Worm

B

Trojan horse

C

Spyware

D

Firewall

Ask EduPadi AI for a detailed answer

Share this question

4

What is the primary goal of a phishing attack?

View related lesson
A

To spread malware

B

To encrypt data

C

To trick individuals into revealing information

D

To improve network speed

Ask EduPadi AI for a detailed answer

Share this question

5

Which security threat can result from using outdated software?

View related lesson
A

Improved performance

B

Increased compatibility

C

Vulnerabilities

D

Reduced power consumption

Ask EduPadi AI for a detailed answer

Share this question

6

What type of malware disguises itself as legitimate software?

View related lesson
A

Virus

B

Worm

C

Trojan horse

D

 Spyware

Ask EduPadi AI for a detailed answer

Share this question

7

What do Trojans often create in a compromised system?

View related lesson
A

Stronger encryption

B

Data backups

C

Backdoors

D

Antivirus protection

Ask EduPadi AI for a detailed answer

Share this question

8

Which of the following is NOT a source of security breaches?

View related lesson
A

Weak passwords

B

Phishing attacks

C

Regular software updates

D

Insider threats

Ask EduPadi AI for a detailed answer

Share this question

9

What is the purpose of an ICT policy in an organization?

View related lesson
A

To maximize profits

B

To regulate employee dress code

C

To establish ethical guidelines

D

To discourage teamwork

Ask EduPadi AI for a detailed answer

Share this question

10

What can happen if an ICT policy is poorly implemented?

View related lesson
A

Improved data security

B

Legal consequences

C

Increased productivity

D

Enhanced customer satisfaction

Ask EduPadi AI for a detailed answer

Share this question

Recommended:SS3 ICT Lessons

Share this page