Security and Ethics - SS3 ICT Past Questions and Answers - page 2
Why are encryption techniques important in data protection?
To slow down data transmission
To complicate data storage
To protect data from unauthorized access
To decrease data accuracy
Share this question
What is an example of an insider threat?
Outdated software
Phishing emails
An employee stealing company data
Regular software updates
Share this question
What is the primary aim of ethical guidelines in technology?
To restrict innovation
To encourage discrimination
To promote responsible and fair technology use
To increase cyberattacks
Share this question
What can be the consequence of ignoring ICT policies?
Enhanced security
Improved employee morale
Data breaches and ethical violations
Decreased regulatory scrutiny
Share this question
What is the primary role of a firewall in cybersecurity?
To create network backups
To prevent unauthorized access to a network
To speed up internet connections
To install antivirus software
Share this question
Explain the concept of a "phishing attack" and provide an example.
Share this question
What are some common practices to strengthen the security of passwords?
Share this question
Describe the potential consequences of a security breach for an organization.
Share this question
How can organizations mitigate insider threats effectively?
Share this question
Discuss the importance of regularly updating software and operating systems for security.
Share this question