Security and Ethics - SS3 ICT Past Questions and Answers - page 1
What is a common source of security breaches?
Viruses
Firewalls
Software updates
Hardware maintenance
Share this question
What is a common source of security breaches?
Viruses
Firewalls
Software updates
Hardware maintenance
Share this question
Which type of malware replicates and spreads to other files or programs?
Worm
Trojan horse
Spyware
Firewall
Share this question
What is the primary goal of a phishing attack?
To spread malware
To encrypt data
To trick individuals into revealing information
To improve network speed
Share this question
Which security threat can result from using outdated software?
Improved performance
Increased compatibility
Vulnerabilities
Reduced power consumption
Share this question
What type of malware disguises itself as legitimate software?
Virus
Worm
Trojan horse
Spyware
Share this question
What do Trojans often create in a compromised system?
Stronger encryption
Data backups
Backdoors
Antivirus protection
Share this question
Which of the following is NOT a source of security breaches?
Weak passwords
Phishing attacks
Regular software updates
Insider threats
Share this question
What is the purpose of an ICT policy in an organization?
To maximize profits
To regulate employee dress code
To establish ethical guidelines
To discourage teamwork
Share this question
What can happen if an ICT policy is poorly implemented?
Improved data security
Legal consequences
Increased productivity
Enhanced customer satisfaction
Share this question