1.
Which one of the following can cause data corruption?
Correct Answer
C. C. Software incompatibility.
Explanation
Software incompatibility can cause data corruption because when incompatible software is used together, it can lead to conflicts and errors in the system. This can result in data being improperly processed or stored, leading to corruption.
2.
Which one of the following describes how a portable or removable device can be protected from theft when NOT in use?
Correct Answer
C. C. By locking it in a drawer.
Explanation
The best way to protect a portable or removable device from theft when it is not in use is by physically securing it. Locking it in a drawer provides a physical barrier and prevents unauthorized access to the device. Activating a firewall and installing anti-virus software are measures to protect the device from online threats, but they do not prevent physical theft. Storing documents in a folder may provide some level of organization, but it does not protect the device itself from being stolen.
3.
Which one of the following is MOST likely to happen if a network is unsecured?
Correct Answer
A. A. Information will be accessible to others.
Explanation
If a network is unsecured, it means that there are no security measures in place to protect the information transmitted over the network. This makes it easy for unauthorized individuals to access and view the information. Therefore, the most likely outcome of an unsecured network is that the information will be accessible to others.
4.
Which one of the following describes how a password helps to keep a computer secure?
Correct Answer
C. C. It protects information on a computer from risk of unauthorised access.
Explanation
A password helps to keep a computer secure by protecting the information on the computer from the risk of unauthorized access. It acts as a barrier, preventing unauthorized individuals from gaining access to sensitive data and ensuring that only authorized users can access the computer and its contents.
5.
Which one of the following describes how a malicious program can enter a computer?
Correct Answer
A. A. By downloading files from unknown websites.
Explanation
A malicious program can enter a computer by downloading files from unknown websites. These websites may contain infected files or links that, when clicked, initiate the download of a malicious program onto the computer. It is important to be cautious when downloading files from unknown sources to prevent the entry of malicious programs that can harm the computer and compromise its security.
6.
Which one of the following describes how a breach in IT security should be reported?
Correct Answer
C. C. Using the channel identified in the organisation’s security policy.
Explanation
The correct answer is C. Using the channel identified in the organization’s security policy. When a breach in IT security occurs, it is important to follow the proper protocol for reporting it. This typically involves using the designated channel as outlined in the organization's security policy. This ensures that the breach is reported to the appropriate individuals or teams who can take the necessary actions to address and mitigate the issue. It also helps to maintain confidentiality and prevent unauthorized access to the information about the breach.
7.
Which one of the following describes what you should do if you receive a chain letter email?
Correct Answer
A. A. Delete it.
Explanation
If you receive a chain letter email, the best course of action is to delete it. Chain letters are typically considered spam and can potentially contain harmful attachments or links. Replying to or forwarding the email can perpetuate the chain letter, causing it to spread to more people. Downloading any attachments from the email can also put your computer at risk for viruses or malware. Therefore, the safest and most appropriate response is to delete the chain letter email.
8.
Which one of the following could happen if a computer suddenly malfunctions due to proximity to a heat source?
Correct Answer
A. A. Any files saved only on the hard disk of the computer will be lost.
Explanation
Proximity to a heat source can cause a computer to malfunction, potentially leading to hardware failure. In such cases, files saved only on the hard disk of the computer may be lost if the malfunction affects the integrity of the storage device. Heat can damage the physical components of the hard disk, leading to data loss. Options B, C, and D are incorrect because they do not directly relate to the consequences of a computer malfunction due to proximity to a heat source.
9.
Which one of the following is at risk from unauthorised access to a computer?
Correct Answer
B. B. Confidential information can be accessed.
Explanation
Unauthorized access to a computer puts confidential information at risk. This means that someone who is not authorized to access the computer can gain access to sensitive and private information stored on the computer. This can include personal data, financial information, passwords, and other sensitive information that could be used for malicious purposes such as identity theft or fraud.
10.
Which one of the following should you do to ensure that you follow an organisation’s privacy policy when communicating internally?
Correct Answer
B. B. Consult the Legal Department or policy manual when in doubt.
Explanation
To ensure that you follow an organization's privacy policy when communicating internally, it is recommended to consult the Legal Department or policy manual when in doubt. This is because the Legal Department or policy manual will provide guidance and clarification on the privacy policy, ensuring that you adhere to the organization's guidelines and regulations regarding privacy. This approach helps to maintain confidentiality and protect sensitive information within the organization.
11.
Which one of the following describes phishing?
Correct Answer
B. B. Fraudulent acquisition of personal information.
Explanation
Phishing refers to the fraudulent practice of acquiring personal information, such as passwords or credit card details, by posing as a trustworthy entity in an electronic communication. This is typically done through deceptive emails or websites that appear to be legitimate. The goal of phishing is to trick individuals into providing their sensitive information, which can then be used for various malicious purposes, such as identity theft or financial fraud.
12.
Which one of the following describes a firewall?
Correct Answer
B. B. An Internet connection filter.
Explanation
A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. By examining the data packets, a firewall can block or allow traffic based on various criteria, such as IP addresses, port numbers, and protocols. It helps to prevent unauthorized access to a network and protects against malicious attacks, making B. An Internet connection filter the correct description for a firewall.
13.
Which one of the following is MOST likely to happen if you keep your PDA in an open pocket of your bag?
Correct Answer
C. C. The PDA will be stolen.
Explanation
If you keep your PDA in an open pocket of your bag, it is most likely that the PDA will be stolen. This is because an open pocket makes it easier for someone to reach into your bag and take the PDA without your knowledge or consent.
14.
Which one of the following is a security risk associated with using the default password on a network?
Correct Answer
D. D. Low resistance to hackers.
Explanation
Using the default password on a network poses a security risk because it makes it easier for hackers to gain unauthorized access. Default passwords are often well-known and widely used, making it easier for attackers to guess or crack them. By not changing the default password, the network becomes more vulnerable to hacking attempts, which can lead to unauthorized access to sensitive information, data breaches, and other malicious activities.
15.
Which one of the following statements about a password is TRUE?
Correct Answer
A. A. It should be changed regularly.
Explanation
The correct answer is A. It should be changed regularly. This statement is true because regularly changing passwords helps to maintain security and reduce the risk of unauthorized access. By changing passwords at regular intervals, it becomes more difficult for hackers to guess or crack the password. Regular password changes also help to mitigate the impact of any potential data breaches or leaks.
16.
Which one of the following describes why you should follow procedures while using IT resources in an organisation?
Correct Answer
A. A. To ensure the secure use of IT resources.
Explanation
Following procedures while using IT resources in an organization is important to ensure the secure use of these resources. Procedures help in establishing guidelines and protocols for accessing and utilizing IT resources, which can prevent unauthorized access, data breaches, and other security risks. By following procedures, individuals can also contribute to maintaining the integrity and confidentiality of sensitive information, protecting the organization's digital assets, and minimizing the potential impact of cyber threats.
17.
Which one of the following describes why it is important to have a secure off-site backup copy of files?
Correct Answer
A. A. To reduce downtime caused by file loss in case of a disaster.
Explanation
Having a secure off-site backup copy of files is important because it helps to reduce downtime caused by file loss in case of a disaster. If files are lost due to a disaster such as a fire, flood, or theft, having a backup copy stored off-site ensures that the files can be easily recovered and restored, minimizing the amount of time that the system is down and preventing any potential loss of data or productivity.
18.
Which one of the following is the name for unwanted bulk messages sent by unknown sources?
Correct Answer
D. D. Spam.
Explanation
Spam refers to unwanted bulk messages sent by unknown sources. It can be in the form of emails, text messages, or advertisements. These messages are typically sent to a large number of recipients without their consent and often contain promotional or fraudulent content. Spam is a common issue in electronic communication and can be a nuisance or even a security threat.
19.
Which one of the following will protect a computer from malicious programs?
Correct Answer
A. A. Marking emails with attachments from unknown senders as junk mail.
Explanation
Marking emails with attachments from unknown senders as junk mail is the correct answer because it helps to prevent the user from opening potentially harmful attachments. By marking these emails as junk, they are automatically filtered into a separate folder, reducing the risk of accidentally opening a malicious program. This practice is a common security measure to protect against malware and other harmful programs that can be spread through email attachments.
20.
Which one of the following describes how confidential information should be sent using an unsecured network?
Correct Answer
B. B. In an encrypted format.
Explanation
Confidential information should be sent in an encrypted format when using an unsecured network to ensure that it is protected and cannot be accessed by unauthorized individuals. Encryption involves converting the information into a code that can only be deciphered with the appropriate decryption key. This adds an extra layer of security to the information being transmitted, making it difficult for anyone intercepting the data to understand its contents.
21.
Which one of the following can protect a computer from the risk of unwanted emails?
Correct Answer
A. A. Using anti-spam software.
Explanation
Using anti-spam software can protect a computer from the risk of unwanted emails. Anti-spam software is specifically designed to filter out and block spam emails, which are unsolicited and often contain malicious content or links. By using anti-spam software, users can reduce the chances of falling victim to phishing scams, malware attacks, and other threats that may be hidden within spam emails. This software can identify and block spam emails based on various criteria, such as sender reputation, content analysis, and user-defined filters.
22.
Which one of the following will ensure that software is stored safely?
Correct Answer
A. A. Backing up the software applications.
Explanation
Storing software safely involves measures to prevent loss or corruption of data. Option B, backing up the software applications, is the most effective way to ensure that software is stored safely. Backing up software involves making copies of the software and storing them in a separate location or on external storage devices. This protects against data loss in case of hardware failure, accidental deletion, or other unforeseen circumstances.
23.
Which one of the following describes the IT security checks that should be carried out when using a device that is NOT part of an organisation’s IT infrastructure?
Correct Answer
A. A. The checks listed in the organisation’s security policy.
Explanation
The correct answer is A because an organization's security policy outlines the specific security measures and checks that should be followed when using any device, whether it is part of the organization's IT infrastructure or not. This policy ensures that consistent security practices are followed to protect the organization's data and systems from potential threats. Help forums, device manuals, or suggestions from colleagues may provide some guidance, but they may not be tailored to the organization's specific security requirements. Therefore, relying on the organization's security policy is the most appropriate approach.
24.
Which one of the following is an example of phishing?
Correct Answer
C. C. An email directing the recipient to a website to verify credit card details.
Explanation
Phishing is a type of cyber attack where the attacker poses as a legitimate entity in order to deceive the recipient into revealing sensitive information such as passwords or credit card details. Option C fits this definition as it involves an email directing the recipient to a website to verify credit card details, which is a common tactic used by phishers to steal personal information. Options A, B, and D do not involve the deception of the recipient for personal gain, making them incorrect choices for examples of phishing.
25.
Which one of the following describes how confidential information should be sent using an unsecured network?
Correct Answer
D. D. Encrypted, so that only a person with a key can decrypt it.
Explanation
Confidential information should be sent using encryption on an unsecured network to ensure that it remains secure and cannot be accessed by unauthorized individuals. Encryption involves converting the information into a coded form that can only be decrypted by someone who has the correct key. This ensures that even if the information is intercepted during transmission, it cannot be understood or accessed without the key. This is a crucial measure to protect sensitive data and maintain confidentiality.
26.
Which one of the following does NOT show respect for the confidentiality of information a user has access to?
Correct Answer
D. D. Disclosing sensitive information to colleagues.
Explanation
Disclosing sensitive information to colleagues does not show respect for the confidentiality of information a user has access to. This action violates the principle of keeping sensitive information confidential and can potentially lead to unauthorized access or misuse of the information.
27.
Which one of the following would prevent theft of a laptop?
Correct Answer
B. B. A security cable.
Explanation
A security cable can prevent theft of a laptop by physically attaching it to a fixed object, making it difficult for someone to steal the laptop without damaging it or the cable. This acts as a deterrent and makes it less likely for someone to attempt to steal the laptop in the first place.
28.
Which one of the following protects a computer from the risk of malicious programs?
Correct Answer
A. A. Anti-virus software.
Explanation
Anti-virus software protects a computer from the risk of malicious programs by detecting, preventing, and removing them. It scans the computer for viruses, worms, Trojans, and other types of malware, and quarantines or removes them to keep the system safe. It also provides real-time protection by monitoring the computer's activities and blocking any suspicious or harmful files or websites. Anti-virus software is essential for maintaining the security and integrity of a computer system.
29.
Which one of the following departments usually holds guidelines and procedures for the secure use of IT within an organisation?
Correct Answer
D. D. The IT Department.
Explanation
The IT Department is responsible for holding guidelines and procedures for the secure use of IT within an organization. This department is specifically focused on managing and maintaining the organization's technology infrastructure, including security measures to protect against cyber threats and ensure the safe use of IT resources. The Sales Department, Cleaning Department, and Admin Department do not typically have the expertise or responsibility for managing IT security within an organization.
30.
Which one of the following would be considered the BEST way to remember a password?
Correct Answer
D. D. Memorise it.
Explanation
Memorizing a password is considered the best way to remember it because it eliminates the risk of the password being lost or stolen. Entering it in a mobile phone or writing it down on a piece of paper increases the chances of it falling into the wrong hands. Sharing the password with a work colleague is also not recommended as it compromises the security and confidentiality of the password. Therefore, memorizing the password is the most secure and reliable method.
31.
Which one of the following is the MOST damaging consequence of inappropriate disclosure of information on a fake website?
Correct Answer
B. B. Theft of identity.
Explanation
The most damaging consequence of inappropriate disclosure of information on a fake website is the theft of identity. When personal information is shared on a fake website, it can be used by malicious individuals to impersonate someone else, commit fraud, or gain unauthorized access to sensitive accounts. This can lead to financial loss, reputational damage, and a variety of other serious consequences for the individual whose identity has been stolen.
32.
Which one of the following ensures that anti-virus software is effective?
Correct Answer
C. C. Updating the anti-virus software regularly.
Explanation
Updating the anti-virus software regularly ensures that it remains effective because new viruses and malware are constantly being developed. By regularly updating the software, it can detect and remove the latest threats, providing better protection for the computer system.
33.
Which one of the following describes a computer hacker?
Correct Answer
D. D. A skilled programmer who is able to gain unauthorised access into a system.
Explanation
A computer hacker is a skilled programmer who is able to gain unauthorized access into a system. They use their programming skills to exploit vulnerabilities in computer systems and networks, bypassing security measures to gain access to sensitive information or cause damage.
34.
Which one of the following is an appropriate place to back up personal data?
Correct Answer
D. D. On a labelled CD.
Explanation
Backing up personal data on a labelled CD is an appropriate place because CDs are portable and can be easily stored in a safe location. They provide a physical copy of the data that can be accessed even if the computer or other devices fail. CDs also have a long lifespan and are not susceptible to malware or hacking. Additionally, labelling the CD ensures that it can be easily identified and located when needed.
35.
Which one of the following is the recommended action to prevent the risk of access to a network by outside users?
Correct Answer
B. B. Adjust the Internet security settings.
Explanation
The recommended action to prevent the risk of access to a network by outside users is to adjust the Internet security settings. This means configuring the settings to ensure that only authorized users can access the network and that proper security measures are in place to protect against unauthorized access. Swapping network cables in a hub cabinet, complaining to the system administrator, or hiding the computer under the desk would not effectively address the risk of outside users accessing the network.
36.
Which one of the following is MOST likely to happen if you leave your mobile phone unattended on your desk?
Correct Answer
D. D. The device will be stolen.
Explanation
Leaving a mobile phone unattended on a desk increases the risk of theft. Unattended phones are easy targets for thieves who can quickly grab the device and disappear. The other options are less likely to happen in this scenario. The battery leaking is unlikely unless there is a defect in the phone or it is exposed to extreme conditions. The phone's memory being erased or causing mobile interference on a landline are also unlikely unless there is a specific technical issue or malicious intent.