1.
Which one of the following describes spam?
Correct Answer
D. Sending unwanted bulk messages.
Explanation
The correct answer is sending unwanted bulk messages. Spam refers to the act of sending unsolicited and often repetitive messages to a large number of recipients. These messages are typically commercial in nature and are sent without the consent or permission of the recipients. Spamming is considered a nuisance and can clog up email inboxes, consume network resources, and waste the time and attention of recipients.
2.
Which one of the following can protect a computer from the risk of
unwanted emails?
Correct Answer
A. Anti-spam software.
Explanation
Anti-spam software is specifically designed to protect a computer from unwanted emails, commonly known as spam. This type of software employs various techniques to filter and block spam emails, helping users manage their email inboxes more effectively. Options B (Anti-virus software) and C (Anti-spyware software) are focused on protecting against different types of threats, such as viruses and spyware, while option D (PC diagnostic software) is more about analyzing and optimizing computer performance.
3.
Which one of the following could lead to the spread of a malicious
program?
Correct Answer
D. Using a USB Flash Drive from an unknown source to
exchange data.
Explanation
Using a USB Flash Drive from an unknown source to exchange data can lead to the spread of a malicious program because the USB drive may contain infected files or malware. When the infected USB drive is connected to a computer, the malicious program can transfer itself onto the computer, potentially infecting the system and spreading to other devices or networks. It is important to only use trusted and verified sources when exchanging data to minimize the risk of spreading malware.
4.
Which one of the following describes why it is important to update antivirus software regularly?
Correct Answer
B. To ensure the software identifies old and recent viruses.
Explanation
Option B accurately describes why it is important to update antivirus software regularly. Regular updates ensure that the antivirus software has the latest virus definitions, enabling it to identify and protect against both old and recently discovered viruses. This practice is crucial for maintaining the effectiveness of antivirus protection and staying ahead of emerging threats.
5.
Which one of the following describes what you should do if you receive
a chain letter email?
Correct Answer
C. Delete the email.
Explanation
If you receive a chain letter email, you should delete the email. Chain letters are usually considered spam and can be a form of phishing or scam. Forwarding the email may contribute to the spread of the chain letter, downloading it can potentially harm your system, and sending a read receipt is unnecessary. The best course of action is to simply delete the email to avoid any potential risks or consequences.
6.
Which one of the following describes a computer hacker?
Correct Answer
B. A skilled programmer who secretly invades computers without authorisation.
Explanation
The correct answer is "A skilled programmer who secretly invades computers without authorization." This answer accurately describes a computer hacker as someone who uses their programming skills to gain unauthorized access to computer systems and exploit the information within them. Hackers often operate covertly and without permission, making this the most fitting description of their activities.
7.
Which one of the following describes why firewalls are used?
Correct Answer
A. To prevent unauthorized access by incoming transmissions.
Explanation
Firewalls are used to prevent unauthorized access by incoming transmissions. Firewalls act as a barrier between a private internal network and the public internet, monitoring and controlling the incoming and outgoing network traffic. They examine the data packets and determine whether to allow or block them based on predefined security rules. By doing so, firewalls help protect the network from malicious attacks and unauthorized access attempts, ensuring the security and integrity of the system.
8.
Which one of the following is MOST likely to be a hoax?
Correct Answer
C. An email asking you to go to a website for a free computer
scan.
Explanation
An email asking you to go to a website for a free computer scan is most likely to be a hoax because it is a common tactic used by scammers to trick people into visiting malicious websites or downloading malware onto their computers. These emails often claim to offer a free service or a solution to a computer problem, but in reality, they are designed to steal personal information or infect the computer with harmful software. It is important to be cautious and skeptical of any email that asks you to click on a link or visit a website, especially if it is from an unknown source.
9.
Which one of the following is the reason that users should log on with a
username and password?
Correct Answer
C. To protect computers against unauthorized use.
Explanation
Logging on with a username and password is necessary to protect computers against unauthorized use. This security measure ensures that only authorized individuals have access to the system, preventing potential threats and unauthorized activities. By requiring users to enter a unique username and password, it helps to verify their identity and restrict access to sensitive information, files, and resources. This helps maintain the confidentiality, integrity, and availability of the computer system, protecting it from potential security breaches and unauthorized access.
10.
Which one of the following statements about a password is TRUE?
Correct Answer
D. It should be changed regularly.
Explanation
The correct answer is that a password should be changed regularly. This is because regularly changing passwords helps to enhance security and reduce the risk of unauthorized access. By changing passwords frequently, it becomes more difficult for hackers or unauthorized individuals to guess or crack the password. Regularly changing passwords also helps to mitigate the impact of any potential password compromises that may occur.
11.
Which one of the following should be used to change your password?
Correct Answer
A. Control Panel.
Explanation
To change your password, you should use the Control Panel. The Control Panel is a feature in the Windows operating system that allows users to manage various settings and configurations. Within the Control Panel, there is an option to change the password for your user account. This option provides a secure and straightforward way to update your password and ensure the security of your account. Anti-virus software, Windows Firewall, and Internet Explorer are not specifically designed for changing passwords, making Control Panel the correct choice.
12.
Which one of the following shows respect for the confidentiality of
information?
Correct Answer
B. Disclosing confidential information only to authorized individuals.
Explanation
The correct answer is disclosing confidential information only to authorized individuals. This option demonstrates respect for the confidentiality of information by ensuring that only individuals who have been granted permission or authorization have access to the confidential information. This helps to maintain the privacy and security of the information, preventing unauthorized disclosure or misuse. Discussing confidential information over the telephone, uploading it to a shared website, or emailing it to a colleague may all potentially compromise the confidentiality of the information.
13.
Which one of the following would be considered the BEST way to store
a PIN number?
Correct Answer
C. Memorise it.
Explanation
Memorizing the PIN number would be considered the best way to store it because it eliminates the risk of it being easily accessible to others. Keeping a written note with bank cards or in an office drawer increases the likelihood of it being lost, stolen, or seen by unauthorized individuals. Storing it on a computer also poses security risks, as computers can be hacked or compromised. Memorizing the PIN provides a higher level of security and reduces the chances of unauthorized access.
14.
Which one of the following describes why users should lock their
computer when leaving their desk?
Correct Answer
A. To prevent unauthorized access to data.
Explanation
Users should lock their computers when leaving their desks to prevent unauthorized access to data. This is important because leaving a computer unlocked can allow anyone to access sensitive information, files, and accounts. By locking the computer, users ensure that only authorized individuals can access the data, protecting it from potential breaches and unauthorized use.
15.
Which one of the following is an example of phishing?
Correct Answer
C. An email directing the recipient to enter personal details on a
fake website.
Explanation
An email directing the recipient to enter personal details on a fake website is an example of phishing. Phishing is a fraudulent practice where scammers impersonate a trustworthy entity to deceive individuals into revealing sensitive information such as passwords, credit card numbers, or social security numbers. In this scenario, the email is attempting to trick the recipient into providing personal details on a fake website, which can then be used for identity theft or other malicious purposes. It is important to be cautious and verify the authenticity of any email requesting personal information before providing any sensitive data.
16.
Which one of the following is an unsafe online activity?
Correct Answer
D. Giving your home address to someone you met in a chat room.
Explanation
Giving your home address to someone you met in a chat room is the unsafe online activity because it involves sharing personal information with a stranger. This can put your safety and privacy at risk, as the person may use the address for malicious purposes or to harm you in some way. It is important to be cautious and not share sensitive information, such as your home address, with individuals you have only met online.
17.
Which one of the following describes a public network?
Correct Answer
C. A network where devices outside the network can see and
communicate directly with computers on the network.
Explanation
A public network is a network where devices outside the network can see and communicate directly with computers on the network. This means that devices such as computers, smartphones, or tablets that are not part of the network can access and interact with the computers on the network. This is in contrast to a private network where access and communication with devices outside the network are restricted.
18.
Which one of the following describes how confidential information
should be sent using an unsecured network?
Correct Answer
B. In an encrypted format.
Explanation
Confidential information should be sent using an encrypted format when using an unsecured network. Encryption ensures that the information is scrambled and can only be accessed by authorized individuals with the decryption key. This adds an extra layer of security and protects the confidentiality of the information being transmitted.
19.
Which one of the following statements about wireless networks is
TRUE?
Correct Answer
D. They can be accessible to other users.
Explanation
The correct answer is "They can be accessible to other users." This statement is true because wireless networks operate through radio waves, which can be intercepted by anyone within range who has the necessary equipment. This means that unauthorized users can potentially access and use the network if not properly secured.
20.
Which one of the following is the recommended action to prevent the
risk of access to a network by other users?
Correct Answer
C. Change the default WEP or WPA access key to one that only you know.
Explanation
Changing the default WEP or WPA access key to one that only you know is the recommended action to prevent the risk of access to a network by other users. By changing the default access key, you ensure that only authorized users who know the new key can access the network. This helps to protect the network from unauthorized access and potential security breaches. Disconnecting the computer from the network or complaining to the System Administrator may not effectively prevent access by other users. Adjusting Internet security settings may enhance security, but changing the access key is a more direct and secure method.
21.
Which one of the following describes Bluetooth?
Correct Answer
B. Short-range wireless protocol for exchanging data.
Explanation
Bluetooth is a short-range wireless protocol that allows devices to exchange data. It is commonly used for connecting devices such as smartphones, tablets, and computers to peripherals like keyboards, speakers, and headphones. Bluetooth operates on a low-power radio frequency, making it ideal for short-range communication between devices in close proximity. It is not a wired protocol, nor is it designed for long-range communication.
22.
Which one of the following describes why Bluetooth device settings
should be adjusted?
Correct Answer
C. To prevent the risk of unauthorized access.
Explanation
Adjusting Bluetooth device settings can help prevent the risk of unauthorized access. By adjusting the settings, such as enabling password protection or changing the device's visibility settings, users can enhance the security of their Bluetooth devices. This is important because Bluetooth connections can be vulnerable to unauthorized access, potentially allowing attackers to gain control of the device or access sensitive information. Therefore, adjusting the settings can help mitigate this risk and ensure the privacy and security of the device and its data.
23.
Which one of the following would result in the loss of contact details if it
were stolen?
Correct Answer
B. Mobile pHone.
Explanation
A mobile phone would result in the loss of contact details if it were stolen because it typically stores a person's contacts and phone numbers. This information is usually saved in the phone's memory or SIM card, and if the phone is stolen, the thief would have access to this data. On the other hand, a printer, modem, or MP3 player do not typically store contact details, so their theft would not result in the loss of such information.
24.
Which one of the following should you do to ensure that your USB
the storage device is kept safe and secure?
Correct Answer
D. Never leave it unattended.
Explanation
Leaving a USB storage device unattended can pose a security risk as it can be easily accessed or stolen by unauthorized individuals. By not leaving it unattended, you ensure that you have control over who has access to the device and can prevent any potential data breaches or theft.
25.
Which one of the following departments would usually hold guidelines
and procedures for the secure use of IT within an organization?
Correct Answer
A. The IT Department.
Explanation
The IT Department is responsible for managing and maintaining the organization's information technology infrastructure. As part of their role, they would typically develop and enforce guidelines and procedures for the secure use of IT systems within the organization. This includes ensuring that employees follow best practices for data security, using strong passwords, implementing firewalls and antivirus software, and regularly updating software to protect against cyber threats. The IT Department plays a crucial role in safeguarding the organization's digital assets and ensuring the secure use of IT resources.
26.
Which one of the following describes why you should follow the guidelines and procedures while using IT resources in an organization?
Correct Answer
B. To ensure the secure use of IT resources.
Explanation
Following guidelines and procedures while using IT resources in an organization is important to ensure the secure use of those resources. By adhering to guidelines and procedures, individuals can prevent unauthorized access, protect sensitive data, and minimize the risk of security breaches. This helps maintain the integrity and confidentiality of the organization's IT infrastructure and safeguards against potential threats and vulnerabilities.
27.
Which one of the following should you approach if you are unsure of
the IT security procedure to follow when uninstalling an application on
your computer?
Correct Answer
D. The Systems Administrator.
Explanation
The Systems Administrator should be approached if one is unsure of the IT security procedure to follow when uninstalling an application on their computer. The Systems Administrator is responsible for managing and maintaining the computer systems and networks within an organization. They have the expertise and knowledge to guide IT security procedures, including uninstalling applications in a secure manner. They can ensure that the process is carried out correctly and in line with the organization's security protocols.
28.
Which one of the following describes how a breach in IT security
should be reported?
Correct Answer
D. Using the method listed in the organization’s security policy.
Explanation
The correct answer is "Using the method listed in the organization's security policy." This means that when a breach in IT security occurs, it should be reported using the specific guidelines and procedures outlined in the organization's security policy. This ensures that the breach is reported in a consistent and appropriate manner, following the established protocols to address the issue effectively.
29.
Which one of the following describes how to find out about an organization’s privacy policy?
Correct Answer
B. By reading the policy in the organization’s policy manual.
Explanation
To find out about an organization's privacy policy, one should read the policy in the organization's policy manual. This manual typically contains all the official policies and procedures followed by the organization, including the privacy policy. Reading the policy manual provides a comprehensive and accurate understanding of the organization's privacy practices and guidelines. The office newsletter may contain some information about the organization, but it may not necessarily include the privacy policy. Speaking to the Finance or Sales Department may provide some information, but it may not be the most reliable or complete source for understanding the privacy policy.
30.
Which one of the following would prevent the theft of a laptop?
Correct Answer
C. A security cable.
Explanation
A security cable would prevent the theft of a laptop by physically securing it to a stationary object, such as a desk or table. This would make it difficult for someone to steal the laptop without removing the cable, which would require time and effort. Anti-virus software and spyware are not directly related to preventing theft, as they primarily focus on protecting the laptop from malicious software. A webcam can be used for surveillance purposes, but it does not physically prevent the theft of the laptop.
31.
Which one of the following could be the unexpected outcome of
deleting a large group of files?
Correct Answer
B. An important file may be accidentally deleted.
Explanation
Deleting a large group of files can lead to an unexpected outcome where an important file may be accidentally deleted. This is because when deleting a large number of files, it is possible to overlook or mistakenly select a crucial file along with the intended ones. This can result in the loss of important data or information, causing inconvenience or potential harm to the user.
32.
Which one of the following would NOT happen if a computer suddenly
malfunctions?
Correct Answer
D. All off-site backups will be lost.
Explanation
If a computer suddenly malfunctions, it is unlikely that all off-site backups will be lost. Off-site backups are stored in a separate location, typically on a remote server or in the cloud, to ensure that data is preserved even if the computer experiences a malfunction. Therefore, even if the computer malfunctions, the off-site backups should remain intact and accessible.
33.
Which one of the following should you use to back up personal data?
Correct Answer
A. A labeled CD.
Explanation
A labeled CD is the most suitable option for backing up personal data because it provides a physical and secure storage medium. CDs are portable, durable, and can hold a significant amount of data. Additionally, labeling the CD allows for easy identification and organization of the backed-up files. Printouts are not a reliable backup method as they can easily be lost or damaged. Websites offering file-sharing services may not guarantee the security and privacy of personal data. Using a friend's computer is also not recommended, as it may not have adequate backup measures in place.
34.
Which one of the following describes why it is important to have a
a secure off-site backup copy of files?
Correct Answer
C. To prevent the loss of data in the event of a fire.
Explanation
Having a secure off-site backup copy of files is important because it helps prevent the loss of data in the event of a fire. If a fire occurs at the original location where the files are stored, the data could be destroyed and become irretrievable. However, by having a backup copy stored in a different location, the data remains safe and can be recovered even if the original files are lost due to fire damage. This ensures the continuity of business operations and prevents the permanent loss of important information.
35.
Which one of the following describes how software can be stored
safely?
Correct Answer
C. Storing backups of the software.
Explanation
Storing backups of the software is a safe way to store software. Creating backup copies of software ensures that you have a secure and easily recoverable version in case the original is lost, damaged, or becomes unusable. It's important to store backups in a safe and accessible location to prevent data loss.
36.
Which one of the following protects a computer from the risk of malicious programs?
Correct Answer
B. Anti-spyware software.
Explanation
Anti-spyware software is specifically designed to protect a computer from the risk of malicious programs, commonly known as spyware. Spyware is a type of malicious software that monitors and collects information without the user's knowledge, posing a threat to privacy and system security.
Anti-spyware software helps detect and remove such malicious programs, enhancing the overall security of the computer.
Options A, C, and D are not primarily focused on protecting against malicious programs:
A. PC diagnostic software: PC diagnostic software is designed to diagnose and troubleshoot hardware and software issues but may not specifically target malicious programs.
C. Anti-spam software: Anti-spam software is designed to filter out unwanted email messages but may not address the broader category of malicious programs.
D. Web tracking software: Web tracking software is typically used to analyze user behavior on websites and is not specifically geared toward protecting against malicious programs.