1.
Which of the following would be an example of malpractice?
Correct Answer
A. When an employee goes against the company ICT code of practice e.g leaving workstation logged on
Explanation
Malpractice refers to any unethical or illegal behavior that goes against established rules or codes of conduct. In this case, when an employee goes against the company ICT code of practice by leaving their workstation logged on, it can be considered an example of malpractice as it violates the company's policies and compromises the security of the system. This action can potentially lead to unauthorized access to sensitive information and increase the risk of data breaches or other security incidents.
2.
Which of the following would be an example of crime in regards to ICT systems?
Correct Answer
A. When individuals or organisations break the law through using computers illegally access a computer system
Explanation
An example of a crime in regards to ICT systems would be when individuals or organizations break the law by illegally accessing a computer system. This involves unauthorized entry into a computer system with the intention of gaining sensitive information, causing damage, or committing fraudulent activities. Such actions are illegal and punishable by law.
3.
Which of the following would best describe a virus?
Correct Answer
B. A piece of malicious code that is written by programmers and is used to corrupt data and systems.
Explanation
A virus is a piece of malicious code that is created by programmers with the intention of causing harm to computer systems and corrupting data. It is designed to replicate itself and spread from one computer to another, often without the knowledge or consent of the user. Once it infects a system, it can cause various issues such as data loss, system crashes, and unauthorized access.
4.
Which of the following would best describe a firewall?
Correct Answer
A. A barrier between the internet and a private computer that blocks threats such as viruses
Explanation
A firewall is a security measure that acts as a barrier between the internet and a private computer. Its main purpose is to block threats such as viruses, malware, and unauthorized access attempts. By monitoring and controlling incoming and outgoing network traffic, a firewall helps to protect the computer and its data from potential security risks. It acts as a filter, allowing only authorized and safe connections to pass through while blocking or restricting any potentially harmful or malicious traffic.
5.
Anti-Virus software is installed on systems to detect and delete viruses. Which of the following are a type of virus?
Correct Answer(s)
B. Worm
D. Trojan
Explanation
Worms and Trojans are both types of viruses. Worms are self-replicating programs that spread across networks and can cause damage to systems by consuming bandwidth or deleting files. Trojans, on the other hand, are malicious programs that disguise themselves as legitimate software and trick users into installing them. Once installed, Trojans can perform various harmful actions, such as stealing personal information or giving unauthorized access to the attacker.
6.
Which law regulates how personal data is used and protects data subjects from the misuse of their personal data?
Correct Answer
C. Data Protection Act 1998
Explanation
The Data Protection Act 1998 is the correct answer because it is a law that regulates how personal data is used and protects data subjects from the misuse of their personal data. This act sets out principles for the processing of personal data, gives individuals rights regarding their personal data, and imposes obligations on organizations that handle personal data. It aims to ensure that personal data is processed fairly and lawfully, and that individuals have control over how their data is used.
7.
Which law prevents unauthorised access to computer systems?
Correct Answer
B. Computer Misuse Act
Explanation
The Computer Misuse Act is the correct answer because it is a law that specifically addresses and prevents unauthorized access to computer systems. This act was introduced in 1990 in the United Kingdom and it makes it illegal to gain unauthorized access to computer systems, to interfere with computer data or programs, and to use computer systems to commit or facilitate other crimes. It provides legal protection against hacking, unauthorized access, and other cybercrimes, ensuring that individuals and organizations are legally protected against unauthorized access to their computer systems.
8.
Which law prevents unauthorised copying of software code?
Correct Answer
B. Copyright, Designs and Patents Act 1988
Explanation
The Copyright, Designs and Patents Act 1988 is the law that prevents unauthorized copying of software code. This act grants the creator of a piece of software the exclusive rights to reproduce, distribute, and modify the code. It also prohibits others from copying the code without permission, thus protecting the intellectual property rights of the software developer. This law ensures that software developers are able to control the use and distribution of their code, preventing unauthorized copying and infringement.
9.
One way data can be protected is to use:
Correct Answer
B. Encryption
Explanation
Encryption is a method used to protect data by converting it into a code that can only be deciphered with the correct key or password. It ensures that even if unauthorized individuals gain access to the data, they will not be able to understand or use it. Encryption is widely used in various areas, such as online communication, financial transactions, and data storage, to provide confidentiality and security to sensitive information.
10.
A security attack would best be described as:
Correct Answer
A. Any action that compromises the security of data held by and organisation
Explanation
A security attack can be defined as any action that compromises the security of data held by an organization. This includes unauthorized access, theft, alteration, or destruction of data. It encompasses both intentional attacks by hackers or malicious insiders, as well as unintentional incidents caused by human error or system vulnerabilities. By compromising the security of data, an attacker can gain unauthorized access to sensitive information, disrupt business operations, or cause financial and reputational damage to the organization. Therefore, it is crucial for organizations to implement robust security measures to protect their data from potential attacks.