Threats To ICT Systems

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By 2dsm
2
2dsm
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,011
Questions: 10 | Attempts: 797

SettingsSettingsSettings
ICT System Quizzes & Trivia

Threats to ICT systems - AS Level


Questions and Answers
  • 1. 

    Which of the following would be an example of malpractice?

    • A.

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on

    • B.

      When individuals or organisations break the law through using computers illegally access a computer system

    • C.

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.

    Correct Answer
    A. When an employee goes against the company ICT code of practice e.g leaving workstation logged on
    Explanation
    Malpractice refers to any unethical or illegal behavior that goes against established rules or codes of conduct. In this case, when an employee goes against the company ICT code of practice by leaving their workstation logged on, it can be considered an example of malpractice as it violates the company's policies and compromises the security of the system. This action can potentially lead to unauthorized access to sensitive information and increase the risk of data breaches or other security incidents.

    Rate this question:

  • 2. 

    Which of the following would be an example of crime in regards to ICT systems?

    • A.

      When individuals or organisations break the law through using computers illegally access a computer system

    • B.

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.

    • C.

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on

    Correct Answer
    A. When individuals or organisations break the law through using computers illegally access a computer system
    Explanation
    An example of a crime in regards to ICT systems would be when individuals or organizations break the law by illegally accessing a computer system. This involves unauthorized entry into a computer system with the intention of gaining sensitive information, causing damage, or committing fraudulent activities. Such actions are illegal and punishable by law.

    Rate this question:

  • 3. 

    Which of the following would best describe a virus?

    • A.

      When individuals or organisations break the law through using computers illegally access a computer system

    • B.

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.

    • C.

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on

    Correct Answer
    B. A piece of malicious code that is written by programmers and is used to corrupt data and systems.
    Explanation
    A virus is a piece of malicious code that is created by programmers with the intention of causing harm to computer systems and corrupting data. It is designed to replicate itself and spread from one computer to another, often without the knowledge or consent of the user. Once it infects a system, it can cause various issues such as data loss, system crashes, and unauthorized access.

    Rate this question:

  • 4. 

    Which of the following would best describe a firewall?

    • A.

      A barrier between the internet and a private computer that blocks threats such as viruses

    • B.

      A mechanism that is designed to detect, prevent or recover from a security threat

    • C.

      A service that enhances the security of the data-processing systems and the data transfers of an organisation

    Correct Answer
    A. A barrier between the internet and a private computer that blocks threats such as viruses
    Explanation
    A firewall is a security measure that acts as a barrier between the internet and a private computer. Its main purpose is to block threats such as viruses, malware, and unauthorized access attempts. By monitoring and controlling incoming and outgoing network traffic, a firewall helps to protect the computer and its data from potential security risks. It acts as a filter, allowing only authorized and safe connections to pass through while blocking or restricting any potentially harmful or malicious traffic.

    Rate this question:

  • 5. 

    Anti-Virus software is installed on systems to detect and delete viruses. Which of the following are a type of virus?

    • A.

      Snake

    • B.

      Worm

    • C.

      Toad

    • D.

      Trojan

    • E.

      Horse

    Correct Answer(s)
    B. Worm
    D. Trojan
    Explanation
    Worms and Trojans are both types of viruses. Worms are self-replicating programs that spread across networks and can cause damage to systems by consuming bandwidth or deleting files. Trojans, on the other hand, are malicious programs that disguise themselves as legitimate software and trick users into installing them. Once installed, Trojans can perform various harmful actions, such as stealing personal information or giving unauthorized access to the attacker.

    Rate this question:

  • 6. 

    Which law regulates how personal data is used and protects data subjects from the misuse of their personal data?

    • A.

      Computer Misuse Act

    • B.

      Data protection Act 1996

    • C.

      Data Protection Act 1998

    • D.

      Copyright, Designs and Patents Act 1988

    Correct Answer
    C. Data Protection Act 1998
    Explanation
    The Data Protection Act 1998 is the correct answer because it is a law that regulates how personal data is used and protects data subjects from the misuse of their personal data. This act sets out principles for the processing of personal data, gives individuals rights regarding their personal data, and imposes obligations on organizations that handle personal data. It aims to ensure that personal data is processed fairly and lawfully, and that individuals have control over how their data is used.

    Rate this question:

  • 7. 

    Which law prevents unauthorised access to computer systems?

    • A.

      Data protection Act 1996

    • B.

      Computer Misuse Act

    • C.

      Copyright, Designs and Patents Act 1988

    • D.

      Data Protection Act 1998

    Correct Answer
    B. Computer Misuse Act
    Explanation
    The Computer Misuse Act is the correct answer because it is a law that specifically addresses and prevents unauthorized access to computer systems. This act was introduced in 1990 in the United Kingdom and it makes it illegal to gain unauthorized access to computer systems, to interfere with computer data or programs, and to use computer systems to commit or facilitate other crimes. It provides legal protection against hacking, unauthorized access, and other cybercrimes, ensuring that individuals and organizations are legally protected against unauthorized access to their computer systems.

    Rate this question:

  • 8. 

    Which law prevents unauthorised copying of software code?

    • A.

      Data Protection Act 1998

    • B.

      Copyright, Designs and Patents Act 1988

    • C.

      Computer Misuse Act

    Correct Answer
    B. Copyright, Designs and Patents Act 1988
    Explanation
    The Copyright, Designs and Patents Act 1988 is the law that prevents unauthorized copying of software code. This act grants the creator of a piece of software the exclusive rights to reproduce, distribute, and modify the code. It also prohibits others from copying the code without permission, thus protecting the intellectual property rights of the software developer. This law ensures that software developers are able to control the use and distribution of their code, preventing unauthorized copying and infringement.

    Rate this question:

  • 9. 

    One way data can be protected is to use:

    • A.

      Bubble wrap

    • B.

      Encryption

    • C.

      Email Attachments

    Correct Answer
    B. Encryption
    Explanation
    Encryption is a method used to protect data by converting it into a code that can only be deciphered with the correct key or password. It ensures that even if unauthorized individuals gain access to the data, they will not be able to understand or use it. Encryption is widely used in various areas, such as online communication, financial transactions, and data storage, to provide confidentiality and security to sensitive information.

    Rate this question:

  • 10. 

    A security attack would best be described as:

    • A.

      Any action that compromises the security of data held by and organisation

    • B.

      Any action that compromises the security of critical data held by and organisation

    Correct Answer
    A. Any action that compromises the security of data held by and organisation
    Explanation
    A security attack can be defined as any action that compromises the security of data held by an organization. This includes unauthorized access, theft, alteration, or destruction of data. It encompasses both intentional attacks by hackers or malicious insiders, as well as unintentional incidents caused by human error or system vulnerabilities. By compromising the security of data, an attacker can gain unauthorized access to sensitive information, disrupt business operations, or cause financial and reputational damage to the organization. Therefore, it is crucial for organizations to implement robust security measures to protect their data from potential attacks.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 24, 2010
    Quiz Created by
    2dsm
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.