EduPadi logo
Home App Pricing Classroom
Blog
👤My Account

Score High in JAMB With EduPadi CBT App

Practice JAMB CBT, get instant results, and understand solutions in-depth with smart AI insights.

Learn more…

Security and Ethics - SS3 ICT Past Questions and Answers - page 1

1

What is a common source of security breaches?

View related lesson
A

Viruses

B

Firewalls

C

Software updates

D

Hardware maintenance

2

What is a common source of security breaches?

View related lesson
A

Viruses

B

Firewalls

C

Software updates

D

Hardware maintenance

3

Which type of malware replicates and spreads to other files or programs?

View related lesson
A

Worm

B

Trojan horse

C

Spyware

D

Firewall

4

What is the primary goal of a phishing attack?

View related lesson
A

To spread malware

B

To encrypt data

C

To trick individuals into revealing information

D

To improve network speed

5

Which security threat can result from using outdated software?

View related lesson
A

Improved performance

B

Increased compatibility

C

Vulnerabilities

D

Reduced power consumption

6

What type of malware disguises itself as legitimate software?

View related lesson
A

Virus

B

Worm

C

Trojan horse

D

 Spyware

7

What do Trojans often create in a compromised system?

View related lesson
A

Stronger encryption

B

Data backups

C

Backdoors

D

Antivirus protection

8

Which of the following is NOT a source of security breaches?

View related lesson
A

Weak passwords

B

Phishing attacks

C

Regular software updates

D

Insider threats

9

What is the purpose of an ICT policy in an organization?

View related lesson
A

To maximize profits

B

To regulate employee dress code

C

To establish ethical guidelines

D

To discourage teamwork

10

What can happen if an ICT policy is poorly implemented?

View related lesson
A

Improved data security

B

Legal consequences

C

Increased productivity

D

Enhanced customer satisfaction

Recommended: SS3 ICT Lessons