EduPadi logo
Home App Pricing Classroom
Blog
👤My Account

Score High in JAMB With EduPadi CBT App

Practice JAMB CBT, get instant results, and understand solutions in-depth with smart AI insights.

Learn more…

Security and Ethics - SS3 ICT Past Questions and Answers - page 2

11

Why are encryption techniques important in data protection?

View related lesson
A

To slow down data transmission

B

To complicate data storage

C

To protect data from unauthorized access

D

To decrease data accuracy

12

What is an example of an insider threat?

View related lesson
A

Outdated software

B

Phishing emails

C

An employee stealing company data

D

Regular software updates

13

What is the primary aim of ethical guidelines in technology?

View related lesson
A

To restrict innovation

B

To encourage discrimination

C

To promote responsible and fair technology use

D

To increase cyberattacks

14

What can be the consequence of ignoring ICT policies?

View related lesson
A

Enhanced security

B

Improved employee morale

C

Data breaches and ethical violations

D

Decreased regulatory scrutiny

15

What is the primary role of a firewall in cybersecurity?

View related lesson
A

To create network backups

B

To prevent unauthorized access to a network

C

To speed up internet connections

D

To install antivirus software

16

Explain the concept of a "phishing attack" and provide an example.

View related lesson
17

What are some common practices to strengthen the security of passwords?

View related lesson
18

Describe the potential consequences of a security breach for an organization.

View related lesson
19

How can organizations mitigate insider threats effectively?

View related lesson
20

Discuss the importance of regularly updating software and operating systems for security.

View related lesson
Recommended: SS3 ICT Lessons