1.
Question 1 - Unwanted unsolicited messages, sent by unknown sources, are known as?
Correct Answer
D. Spam
Explanation
Unwanted unsolicited messages, sent by unknown sources, are commonly referred to as "spam". Spam messages are typically sent in bulk and can include various types of content such as advertisements, scams, or malicious links. The term "spam" originated from a Monty Python skit in which the word was repeated excessively, much like how unwanted messages can flood someone's inbox. Spam is a nuisance and can be harmful if it contains malware or attempts to deceive recipients.
2.
Question 2 - A computer can be protected from the risk of unwanted emails by?
Correct Answer
B. Using anti-spam software
Explanation
A computer can be protected from the risk of unwanted emails by using anti-spam software. Anti-spam software is specifically designed to filter and block unwanted or unsolicited emails, minimizing the risk of receiving spam messages in your inbox.
3.
Question 3 - Which one of the following describes how a virus can enter a computer
Correct Answer
C. By opening email attachments from an unknown source
Explanation
Opening email attachments from an unknown source can allow a virus to enter a computer. Viruses can be attached to emails and when the attachment is opened, the virus is executed, infecting the computer. It is important to be cautious when opening attachments from unknown sources to avoid the risk of virus infection.
4.
Question 4 - What action should you take if you receive a chain letter email?
Correct Answer
D. Delete the email
Explanation
If you receive a chain letter email, the best action to take is to delete the email. Chain letters are usually considered spam and can be annoying or even harmful. Forwarding the email to others can contribute to the spread of spam and potentially harm others. Downloading the email onto your system can put your computer at risk of viruses or malware. Opening it immediately can also be risky as it may contain harmful content. Therefore, the safest and most appropriate action is to delete the email.
5.
Question 5 -Which one fo the following best describes phishing??
Correct Answer
A. An email directing the recipient to enter personal details on a fake website
Explanation
Phishing is a type of cyber attack where the attacker poses as a legitimate entity and tries to deceive the recipient into providing their personal information, such as passwords or credit card details, by directing them to a fake website that looks authentic. This answer accurately describes phishing as it involves an email that directs the recipient to enter personal details on a fake website, which is a common tactic used by phishers to steal sensitive information from unsuspecting individuals.
6.
Question 6 - To ensure that anti-virus software is effective you must?
Correct Answer
B. Update the anti-virus software regularly
Explanation
To ensure that anti-virus software is effective, it is necessary to update it regularly. This is because new viruses and malware are constantly being developed, and updating the software allows it to stay up-to-date with the latest threats. By regularly updating the anti-virus software, it can effectively detect and remove any new viruses or malware that may infect the system. Installing windows software updates, restricting computer access to known persons, and installing the latest versions of software are also important for overall system security, but they do not specifically address the effectiveness of the anti-virus software.
7.
Question 7 - Which one of the following will minimize the risk of your computer from being infected by a malicious program?
Correct Answer
B. Anti-spyware software
Explanation
Using anti-spyware software helps minimize the risk of a computer being infected by a malicious program. Spyware is a type of malicious software that can collect personal information, monitor online activities, and cause other harmful effects. Anti-spyware software is specifically designed to detect and remove spyware from a computer system, thereby reducing the risk of infection. This software scans the system for any signs of spyware, blocks malicious websites, and provides real-time protection against potential threats. By using anti-spyware software, users can protect their computers and personal information from being compromised by malicious programs.
8.
Question 8 - Which product below protects a computer from the risk of malicious programs?
Correct Answer
B. Anti-spyware software.
Explanation
Anti-spyware software is designed to protect a computer from malicious programs that are specifically designed to spy on the user's activities, gather personal information, and transmit it to unauthorized third parties. It detects and removes spyware, adware, and other potentially unwanted programs that can compromise the security and privacy of the computer. PC diagnostic software is used to diagnose and troubleshoot hardware and software issues, key management software is used for managing encryption keys, and anti-spam software is used to filter and block unwanted email messages.
9.
Question 9 - Internet-based attacks on your computer are prevented by which of the following?
Correct Answer
A. Firewall software
Explanation
Firewall software is designed to prevent unauthorized access to a computer or network by monitoring and controlling incoming and outgoing network traffic. It acts as a barrier between the internal network and the internet, filtering out potential threats and blocking malicious traffic. Unlike anti-spam, anti-virus, and anti-malware software which primarily focus on specific types of threats, firewall software provides a more comprehensive protection by blocking various types of internet-based attacks such as hacking attempts, malware, and unauthorized access. Therefore, firewall software is the most effective solution for preventing internet-based attacks on a computer.
10.
Question 10 -A computer
hacker can be described as?
Correct Answer
D. A skilled programmer who secretly invades computers without authorisation.
Explanation
The correct answer is "A skilled programmer who secretly invades computers without authorization." This answer accurately describes a computer hacker as someone who uses their programming skills to gain unauthorized access to computers and exploit the information available on them. Hackers often break into computer systems without permission and may engage in activities such as stealing data, causing damage, or engaging in illegal activities.
11.
Question 11 - Using the default password on a network is a security risk.
Which is the most serious?
Correct Answer
D. Low resistance to potential hackers.
Explanation
Using the default password on a network is a security risk because it makes it easier for potential hackers to gain unauthorized access to the network. This is the most serious issue among the options given because it directly compromises the security of the network and can lead to unauthorized access, data breaches, and other malicious activities. Easy visibility to other users, fast access, and high resistance to application of updates may also pose security risks, but they are not as severe as low resistance to potential hackers.
12.
Question 12 - Your user information, including your password, can be
changed using which of the following?
Correct Answer
B. Control Panel.
Explanation
The Control Panel is a feature in Windows operating systems that allows users to view and change system settings. Within the Control Panel, there are various options for managing user information, including the ability to change passwords. The Task Manager is used to monitor and manage running processes, not to change user information. MS Word Options is specific to Microsoft Word and does not have the capability to change user information. Windows Firewall is used to manage network connections and security settings, but it does not provide options for changing user information. Therefore, the correct answer is Control Panel.
13.
Question 13 - The BEST way to remember a password is?
Correct Answer
A. Commit it to memory
Explanation
Committing a password to memory is the best way to remember it because it eliminates the risk of someone finding and using the password if it is written down or stored in a physical location like a wallet. Remembering the password also ensures that it is readily accessible whenever needed, without the need to rely on external sources or disclosing it to others. Using the name of a cat or any other personal information as a password is not recommended as it can be easily guessed or hacked.
14.
Question 14 - A user name and password are entered when
logging onto a computer. Which one of the following is a feature of using a
user name?
Correct Answer
B. It limits access to relevant levels of information.
Explanation
A user name is used to identify a specific user and is typically associated with certain privileges or access levels. By using a user name, the system can limit access to only the relevant levels of information that the user is authorized to access. This helps to ensure that users can only view or modify the information that is necessary for their role or responsibilities, enhancing security and protecting sensitive data from unauthorized access.
15.
Question 15 - Why should users log off from a computer when they are
finished for the day?
Correct Answer
C. To prevent unauthorised access to data
Explanation
Logging off from a computer when finished for the day helps prevent unauthorized access to data. When a user logs off, their session is terminated, and any sensitive information or personal data that may be stored on the computer remains protected. This is especially important in shared or public computer environments, where other users may attempt to access or misuse someone else's data if they are not logged off properly. Logging off also ensures that any active connections or processes are terminated, reducing the risk of data corruption or unauthorized activity.
16.
Question 16 - Which one of the following statements shows
respect for confidentiality of information?
Correct Answer
C. Disclosing confidential information only to authorised systems or individuals
Explanation
The correct answer is "Disclosing confidential information only to authorised systems or individuals." This statement demonstrates respect for confidentiality by ensuring that confidential information is only shared with those who have the proper authorization and need-to-know. This helps to protect sensitive information from being accessed or disclosed to unauthorized individuals or systems, maintaining its confidentiality and integrity.
17.
Question 17 -
If you disclose inappropriate or personal information on a
fake website, which one of the following is the MOST damaging
consequence?
Correct Answer
A. Theft of identity.
Explanation
Disclosing inappropriate or personal information on a fake website can lead to the theft of identity. This means that someone can use the information provided to impersonate the individual, potentially causing financial loss, damage to their reputation, and even legal issues. Identity theft is a serious consequence that can have long-lasting and damaging effects on an individual's life.
18.
Question 18 -
Why do we use a PIN number on a mobile device?
Correct Answer
B. It protects information from risk of unauthorised access.
Explanation
A PIN number is used on a mobile device to protect information from the risk of unauthorized access. This means that without the correct PIN, someone cannot access the information stored on the mobile device, ensuring that the data remains secure and confidential.
19.
Question 19 -
Which
one of the following is a facility of a public network?
Correct Answer
D. Resource sharing
Explanation
Resource sharing is a facility of a public network. In a public network, multiple users can access and share resources such as files, printers, and databases. This allows for efficient utilization of resources and promotes collaboration among users. However, it is important to note that while resource sharing is a feature of a public network, it does not necessarily mean that there is no data security or that there is access to all confidential information. These aspects depend on the specific security measures and access controls implemented in the network.
20.
Question 20 -
Which one of the following statements about wireless
networks is TRUE?
Correct Answer
B. They can be visible and accessible to other users.
Explanation
Wireless networks can be visible and accessible to other users. Unlike wired networks, where physical access is required to intercept data, wireless networks transmit data through radio waves, which can be intercepted by anyone within range. This poses a security risk as unauthorized users can potentially access and exploit the network. Therefore, it is important to implement security measures such as encryption and password protection to safeguard wireless networks.
21.
Question 21 -
Using an unsecured network is sometimes unavoidable, which
one of the following describes how confidential information should be sent in
that situation?
Correct Answer
B. In an encrypted format.
Explanation
When using an unsecured network, it is important to protect confidential information. The best way to do this is by sending the information in an encrypted format. Encryption ensures that the data is scrambled and can only be accessed by authorized individuals with the correct decryption key. This adds an extra layer of security and helps to prevent unauthorized access or interception of the confidential information.
22.
Question 22 -
Which
one of the following describes Bluetooth?
Correct Answer
B. Short-range wireless protocol for exchanging data
Explanation
Bluetooth is a short-range wireless protocol used for exchanging data. It allows devices to connect and communicate with each other wirelessly over short distances. Bluetooth technology is commonly used for connecting devices such as smartphones, tablets, laptops, and headphones to each other, enabling the transfer of data, audio, and other information between them.
23.
Question 23 -
Where would the guidelines and procedures for the secure use
of IT within an organization be held?
Correct Answer
A. The IT Department.
Explanation
The guidelines and procedures for the secure use of IT within an organization would be held in the IT Department. This department is responsible for managing and maintaining the organization's IT infrastructure and ensuring its security. They would have the necessary expertise and knowledge to develop and enforce these guidelines and procedures to protect the organization's IT systems and data from potential threats and breaches.
24.
Question 24 -
How
would you find out about an organisation’s privacy policy?
Correct Answer
C. By reading the policy in the organisation’s policy manual
Explanation
To find out about an organization's privacy policy, one would need to read the policy in the organization's policy manual. This is the most reliable and direct source of information regarding the organization's privacy practices and guidelines. The Financial Times may provide information about the organization, but it is unlikely to have specific details about the privacy policy. Speaking to the Finance Department or the Sales Department may provide some insights, but it is not guaranteed that they would have the most up-to-date or comprehensive information on the privacy policy. Therefore, the best option is to refer to the organization's policy manual.
25.
Question 25 -
If you wanted to use a device that is NOT part of the
organisation’s IT infrastructure, what IT security checks should you carry out
before using it?
Correct Answer
D. The checks listed in the organisation’s security policy
Explanation
The correct answer is to refer to the organization's security policy because it is the official document that outlines the specific security measures and checks that need to be followed. The device manual may provide some information, but it may not cover all the necessary security checks. Interviewing the requesting person or relying on the advice of a fellow worker may not guarantee adherence to proper security protocols. Therefore, the organization's security policy is the most reliable source for determining the appropriate IT security checks before using a device not part of the organization's IT infrastructure.
26.
Question 26 -
If you were asked to allow access to a shared IT resource,
who would you ask if you were unsure of the security procedure?
Correct Answer
C. The Systems Administrator
Explanation
The Systems Administrator would be the appropriate person to ask if unsure of the security procedure for accessing a shared IT resource. They are responsible for managing and maintaining the IT systems, including security protocols and procedures. As an expert in their field, they would have the knowledge and understanding of the necessary security measures to ensure the resource is accessed safely and securely.
27.
Question 27 -
How
would a breach in IT security be reported?
Correct Answer
C. Using the channel identified in the organisation’s security policy
Explanation
A breach in IT security would be reported using the channel identified in the organization's security policy. This means that there is a specific method or process outlined in the policy that employees should follow when reporting a security breach. This could include using a specific reporting system or contacting a designated person or department within the organization. By following the established channel, the organization can ensure that the breach is reported promptly and to the appropriate individuals who can take the necessary actions to address and mitigate the security issue.
28.
Question 28 -
If you were to select a large group of adjacent files and
delete them, What could be an unexpected consequence?
Correct Answer
C. An important file may accidentally be deleted
Explanation
If a large group of adjacent files is selected and deleted, there is a possibility that an important file may be accidentally deleted. This can happen if the user mistakenly includes the important file in the selection or if the user is not aware of the contents of the files being deleted. Therefore, it is important to double-check the selection before proceeding with the deletion to avoid any unintended consequences.
29.
Question 29 -
What
could happen if a computer suddenly malfunctions due to overheating?
Correct Answer
D. Any files saved only on the hard disk of the computer may be lost.
Explanation
If a computer suddenly malfunctions due to overheating, any files saved only on the hard disk of the computer may be lost. This is because the overheating can cause damage to the hard disk, leading to data corruption or loss. While the operating system may automatically save and shutdown, and open files may be recovered, any files that were only saved on the hard disk may not be recoverable if it becomes damaged. Off-site backups, which are stored separately from the computer, would not be affected by the overheating and therefore would not be lost.
30.
Question 30 - Why it is important to have a secure, off-site
backup copy of files?
Correct Answer
A. To ensure that in the event of fire, flood or theft backup files are not destroyed
Explanation
Having a secure, off-site backup copy of files is important to ensure that in the event of fire, flood, or theft, the backup files are not destroyed. Storing backups off-site protects them from physical damage or loss that could occur at the primary location. This ensures that even if the original files are destroyed or inaccessible, the backup copies can be retrieved and used for recovery purposes. By keeping backups in a separate location, organizations can mitigate the risk of losing important data due to unforeseen circumstances.
31.
Question 31 -
How
can you best safeguard your personal data?
Correct Answer
D. Making multiple copies of the data.
Explanation
Making multiple copies of the data is the best way to safeguard personal data. By creating multiple copies, you can ensure that even if one copy is lost or compromised, you still have other copies as backups. This helps to minimize the risk of data loss and increases the chances of data recovery in case of any unforeseen events such as hardware failure or cyber attacks.
32.
Question 32 - Which one of the following should you use to
backup personal data?
Correct Answer
A. A storage device, clearly labelled
Explanation
A storage device, clearly labelled, should be used to backup personal data because it provides a physical and secure way to store and retrieve data. By clearly labelling the storage device, it becomes easier to identify and access the specific backup files when needed. Additionally, using a storage device allows for offline access to the backup data, ensuring that it is not dependent on an internet connection or the availability of a specific website or server.
33.
Question 33 -
How would you prevent theft of your laptop if you needed to
leave your desk for a short period?
Correct Answer
D. Use a security cable to secure it to the desk
Explanation
Using a security cable to secure the laptop to the desk is an effective way to prevent theft. This ensures that the laptop cannot be easily taken or moved without removing the cable, providing a physical barrier against theft. Leaving it with a security guard or supervisor may not be feasible or available in all situations, and simply closing the lid does not provide any physical security.
34.
Question 34 -
Where
would be a safe place to keep your MP3 player whilst you are in a public place?
Correct Answer
A. Out of sight, on your person
Explanation
Keeping your MP3 player out of sight and on your person is a safe place to keep it while in a public place. This reduces the risk of it being stolen or lost. Leaving it on the bar or in your open bag on the floor makes it easily accessible to others, increasing the chances of it being taken. Placing it in your jacket pocket hanging over a chair also poses a risk as it could easily fall out or be taken without your knowledge. Therefore, the best option is to keep it on your person where it is secure and not easily visible to potential thieves.
35.
Question 35 -
How
could confidential data stored on a USB memory stick be lost?
Correct Answer
B. When the storage device is lost or stolen during transit
Explanation
Confidential data stored on a USB memory stick can be lost when the storage device is lost or stolen during transit. This means that if the USB memory stick is misplaced or stolen while being transported from one location to another, the confidential data stored on it can be accessed by unauthorized individuals. This highlights the importance of ensuring the security and protection of sensitive data during transportation to prevent potential data breaches.
36.
Question 36 -
How could a portable or removable device can be protected
from theft when NOT in use?
Correct Answer
B. By using a device lock
Explanation
A device lock is a physical security measure that can be used to protect a portable or removable device from theft when it is not in use. It typically involves using a lock or a cable to secure the device to a fixed object, such as a desk or a wall. This prevents unauthorized individuals from easily stealing the device. By using a device lock, the device is physically secured and can provide an additional layer of protection against theft.