Courses » SS3 » SS3 ICT » ICT Exam Topics » Security and Ethics - Questions and Answers

Security and Ethics - SS3 ICT Past Questions and Answers - page 2

11

Why are encryption techniques important in data protection?

A

To slow down data transmission

B

To complicate data storage

C

To protect data from unauthorized access

D

To decrease data accuracy

correct option: c
Users' Answers & Comments
12

What is an example of an insider threat?

A

Outdated software

B

Phishing emails

C

An employee stealing company data

D

Regular software updates

correct option: c
Users' Answers & Comments
13

What is the primary aim of ethical guidelines in technology?

A

To restrict innovation

B

To encourage discrimination

C

To promote responsible and fair technology use

D

To increase cyberattacks

correct option: c
Users' Answers & Comments
14

What can be the consequence of ignoring ICT policies?

A

Enhanced security

B

Improved employee morale

C

Data breaches and ethical violations

D

Decreased regulatory scrutiny

correct option: c
Users' Answers & Comments
15

What is the primary role of a firewall in cybersecurity?

A

To create network backups

B

To prevent unauthorized access to a network

C

To speed up internet connections

D

To install antivirus software

correct option: b
Users' Answers & Comments
16

Explain the concept of a "phishing attack" and provide an example.

A phishing attack is a type of cyberattack where attackers use deceptive emails, messages, or websites to trick individuals into revealing sensitive information, such as login credentials or financial details. An example of a phishing attack is receiving an email that appears to be from a reputable bank, asking you to click a link and enter your account details. The email and website may look legitimate, but they are designed to steal your information.

Users' Answers & Comments
17

What are some common practices to strengthen the security of passwords?

Common practices to strengthen password security include:

Using complex and unique passwords for each account.

Avoiding easily guessable passwords, such as "123456" or "password."

Using a combination of upper and lower-case letters, numbers, and special characters.

Changing passwords regularly.

Using a reputable password manager to generate and store passwords securely.

Users' Answers & Comments
18

Describe the potential consequences of a security breach for an organization.

The consequences of a security breach for an organization can be severe and may include:

  • Loss of sensitive data and customer trust.
  • Financial losses from legal actions, fines, and system repairs.
  • Damage to the organization's reputation.
  • Disruption of business operations.
  • Legal and regulatory consequences for failing to protect customer data.
Users' Answers & Comments
19

How can organizations mitigate insider threats effectively?

  • Mitigating insider threats involves a combination of technical, organizational, and human-focused measures, including:
  • Implementing access controls to limit employees' access to sensitive data.
  • Conducting background checks during the hiring process.
  • Providing cybersecurity training and awareness programs.
  • Monitoring employee behavior and system logs for suspicious activities.
  • Encouraging a culture of transparency and reporting of potential threats.
Users' Answers & Comments
20

Discuss the importance of regularly updating software and operating systems for security.

Regularly updating software and operating systems is essential for security because updates often include patches for known vulnerabilities. Without updates, systems become more susceptible to exploitation by cybercriminals. Hackers can target these vulnerabilities to gain unauthorized access, steal data, or cause other forms of damage. Keeping software up-to-date helps protect against these threats and ensures the latest security features are in place.

Users' Answers & Comments
Recommended: SS3 ICT Lessons
Please share this, thanks: