1.
What type of free downloaded software may
include spyware?
Correct Answer
D. All of the above
Explanation
Free downloaded software such as electronic games, screensavers, and toolbars can include spyware. Spyware is often bundled with these types of software and installed without the user's knowledge or consent. Even anti-spyware software can sometimes include spyware, although it is less common. Therefore, all of the options mentioned in the question can potentially include spyware.
2.
What does it mean if your computer slows down,
displays repeated error messages, serves up a lot of pop-up ads and appears to
send email messages you didn’t write?
Correct Answer
A. You’ve got spyware
Explanation
If your computer slows down, displays repeated error messages, serves up a lot of pop-up ads, and appears to send email messages you didn't write, it suggests that you have spyware. Spyware is a type of malicious software that secretly gathers information about a user's activities without their knowledge and can cause various issues on the infected computer, such as decreased performance, error messages, intrusive ads, and unauthorized email sending.
3.
A pop-up ad appears on your computer screen
offering an anti-spyware product. What’s your best course of action?
Correct Answer
C. Close the window. If you want spyware protection software, you can get it from a provider you know and trust
Explanation
It is best to close the window because pop-up ads offering anti-spyware products are often scams or malicious. Clicking on the link and providing credit card information can lead to identity theft or the installation of actual spyware. It is safer to obtain spyware protection software from a trusted provider that you are familiar with and can verify its legitimacy.
4.
What is “phishing”?
Correct Answer
A. Spoofed emails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords
Explanation
Phishing refers to the act of sending spoofed emails and creating fraudulent websites with the intention of tricking individuals into revealing their personal financial information, such as credit card numbers, account usernames, and passwords. This is done by making the emails and websites appear legitimate and trustworthy, leading the recipients to unknowingly disclose their sensitive data. Phishing is a form of cybercrime aimed at identity theft and financial fraud.
5.
You suspect that your Campus password has been
compromised. What should you do?
Correct Answer
B. Change our password using SSRPM
Explanation
If you suspect that your Campus password has been compromised, the best course of action is to change your password using SSRPM (Self-Service Reset Password Management). This tool allows you to reset your password without the need for assistance from IT support. By changing your password, you can prevent unauthorized access to your account and protect your personal information. Contacting the police station or getting rid of your computer are not necessary steps in this situation, and calling your parents would not directly address the password compromise.
6.
Which of the following is not a UWI Cave Hill
ICT Policy?
Correct Answer
A. Mobile pHone Policy
Explanation
The correct answer is "Mobile Phone Policy" because the question asks for a policy that is not related to UWI Cave Hill's ICT policies. The other options, ICT Security Policy, Email and Messaging Services Policy, and Acceptable Use Policy, all pertain to ICT and technology usage within the institution. However, a Mobile Phone Policy may not specifically fall under the category of ICT policy, as it could be considered more of a general policy that applies to all aspects of the institution's operations.
7.
You just changed your Cave Hill password. Do
you:
Correct Answer
B. Commit the password to memory
Explanation
Committing the password to memory is the best option because it ensures the password remains secure and cannot be easily accessed by others. Writing the password on a sticky note and attaching it to the monitor or hiding it under the keyboard would make it easily visible and accessible to anyone who comes across it. Saving the password on a removable hard drive or USB drive also poses a security risk as it can be lost or stolen. Therefore, memorizing the password is the most secure and recommended option.
8.
You’re in the library studying alone with your
laptop when you have to go and look for a book. What’s your best course of
action?
Correct Answer
B. Secure the laptop with a security cable to the table
Explanation
The best course of action is to secure the laptop with a security cable to the table. This ensures that the laptop is not easily accessible to potential thieves while you are away.
9.
Which of the following actions should you always
take after you’ve finished using your online account?
Correct Answer
C. Click on the log out or log off button on the website
Explanation
After finishing using your online account, it is important to click on the log out or log off button on the website. This action ensures that you are securely ending your session and preventing unauthorized access to your account. It is not recommended to minimize the browser window or set your browser to remember your username and password, as this can leave your account vulnerable to misuse. Shutting down and rebooting your computer is not necessary after using your online account.
10.
You work for an organization with an excellent
information technology department. The HelpDesk sends you an email warning of a
security breach and asks you to confirm your password be entering it into a
secure website. What do you do?
Correct Answer
A. Don’t share your password or any other personal information. Report the incident to the HelpDesk.
Explanation
The correct answer is to not share your password or any other personal information and to report the incident to the HelpDesk. This is because sharing your password or personal information can put your account and sensitive data at risk. It is important to be cautious of phishing attempts, where attackers impersonate legitimate organizations to trick individuals into revealing their credentials. Instead of entering your password on the website, it is advisable to report the incident to the HelpDesk, who can verify the authenticity of the email and take appropriate actions to address the security breach.