Security and Ethics - SS3 ICT Past Questions and Answers - page 1
What is a common source of security breaches?
Viruses
Firewalls
Software updates
Hardware maintenance
What is a common source of security breaches?
Viruses
Firewalls
Software updates
Hardware maintenance
Which type of malware replicates and spreads to other files or programs?
Worm
Trojan horse
Spyware
Firewall
What is the primary goal of a phishing attack?
To spread malware
To encrypt data
To trick individuals into revealing information
To improve network speed
Which security threat can result from using outdated software?
Improved performance
Increased compatibility
Vulnerabilities
Reduced power consumption
What type of malware disguises itself as legitimate software?
Virus
Worm
Trojan horse
Spyware
What do Trojans often create in a compromised system?
Stronger encryption
Data backups
Backdoors
Antivirus protection
Which of the following is NOT a source of security breaches?
Weak passwords
Phishing attacks
Regular software updates
Insider threats
What is the purpose of an ICT policy in an organization?
To maximize profits
To regulate employee dress code
To establish ethical guidelines
To discourage teamwork
What can happen if an ICT policy is poorly implemented?
Improved data security
Legal consequences
Increased productivity
Enhanced customer satisfaction