Security and Ethics - SS3 ICT Past Questions and Answers - page 2
Why are encryption techniques important in data protection?
To slow down data transmission
To complicate data storage
To protect data from unauthorized access
To decrease data accuracy
What is an example of an insider threat?
Outdated software
Phishing emails
An employee stealing company data
Regular software updates
What is the primary aim of ethical guidelines in technology?
To restrict innovation
To encourage discrimination
To promote responsible and fair technology use
To increase cyberattacks
What can be the consequence of ignoring ICT policies?
Enhanced security
Improved employee morale
Data breaches and ethical violations
Decreased regulatory scrutiny
What is the primary role of a firewall in cybersecurity?
To create network backups
To prevent unauthorized access to a network
To speed up internet connections
To install antivirus software
Explain the concept of a "phishing attack" and provide an example.
What are some common practices to strengthen the security of passwords?
Describe the potential consequences of a security breach for an organization.
How can organizations mitigate insider threats effectively?
Discuss the importance of regularly updating software and operating systems for security.