Sorry, but you're not allowed to access this unit. Module 2: I.T SecurityQuestion #1: Which one of the following is a type of cybercrime? Decryption Phishing Force majeure Ethical hacking Question #2: Which one of the following best describes the term ethical hacking? Getting people to carry out unauthorised actions Getting people to divulge confidential information The threat to confidential data from internal staff Authorised testing to determine system security problems Question #3: Which one of the following best describes a worm? A self replicating virus that does not require human interaction A backdoor to the system that allows authorised users to access the network A type of virus that will appear as useful software but once installed will damage the computer A type of virus that does not reproduce Question #4: Which one of the following can be used as a measure to help prevent unauthorised data access? Decrypting confidential files Encrypting confidential files Installing malware Activating the autocomplete feature Question #5: Which one of the following best describes the act of pharming? Redirecting users to a false website without their knowledge Determining security problems in a system through authorised testing Gathering personal information from people through unsolicited phone calls Collecting information on the browser habits of a user without their consent Question #6: Which one of the following best describes the information security characteristic of integrity? It requires authorisation for any data modification It ensures data is protected from unauthorised access It ensures data is accessible at all times It validates the identity of all parties Question #7: Which one of the following describes why firewalls are used? To detect and disable viruses already on a computer To prevent destruction of a computer in the event of a fire To prevent unauthorised access by incoming transmissions Question #8: Which one of the following is considered a direct result of social engineering? Storage space becomes an issue Unauthorised computer access is possible Data integrity is improved Question #9: Which one of the following best describes the term malware? Software that is designed to quarantine suspicious files on the system Software that is designed to cause damage or disruption to a computer system Software that is designed to record all communications and block unauthorised senders Question #10: Which one of the following could be used as a means to conceal malware? Macro free files Degaussed files Rootkits Question #11: Which one of the following best describes a botnet? A type of software that has been downloaded illegally without purchase of a license A number of computers that have been set up to record telephone numbers that have been dialled A type of software that has been designed to block illegal or unwanted communications A number of computers that have been set up to forward transmissions without the owner's consent Question #12: Which one of the following is a limitation of anti-virus software? It is deactivated when the user is connected to a LAN A firewall is required to activate the software Regular updates are required to ensure maximum protection It cannot be used to scan external drives Question #13: Which one of the following best describes the act of ensuring files cannot harm the system by isolating them? Restoring Quarantining Scheduling Scanning Question #14: Which one of the following is a type of network that provides remote users with secure access to their organisation's network? VPN WI-FI MAC LAN Question #15: Which one of the following is used to prevent unauthorised access to a network from outside sources? Rootkits Botnets Malware Firewall Question #16: Which one of the following icons represents a cable network that you could connect to? 1 2 3 Question #17: Which one of the following is required when you access a network account? A cable lock A user name A dialler A digital signature Question #18: Which one of the following is an example of a biometric technique used for access control? Eye scanning Pretexting A firewall Question #19: Which one of the following is considered good practice for online shopping? Using autocomplete to speed up the transaction Using pharming techniques to ensure a secure transaction Using a website that completes transactions on secure pages Question #20: Which one of the following identifies a web page as being secure? .org www https:// Question #21: Which one of the following is text-based information stored by your web browser when you visit a website? A cookie A definition file A back door Question #22: Which one of the following is a type of data that can be deleted through the browser? Pretexted data Autocomplete data Degaussed data Question #23: Which one of the following is a setting that can NOT be modified when using a social networking site? Information about your habits and hobbies Hiding the fact that you have set up an account Privacy controls that you have applied Question #24: Which one of the following best describes the purpose of e-mail encryption? It is used to verify that the e-mail is free from malware It is used to ensure the e-mail can only be read by the intended person It is used in phishing to distribute e-mails to a large number of recipients Question #25: Which one of the following best describes the purpose of a digital signature? To verify the identity of the sender of the email To insert a signature at the bottom of an electronic document by running a macro It verifies that an email has been delivered and not been accessed by any unauthorised recipients Question #26: Which one of the following is the term used for illegal online activity involving misleading someone about your identity in order to gain valuable information? Ethical hacking Pretexting Phishing Question #27: Which one of the following should be considered a security threat when opening e-mail attachments? The file may contain a digital signature The file may delete your cookies when opened The attached file may require a one-time password to open The attached file may contain a macro Question #28: Which one of the following is considered a vulnerability of instant messaging? Biometric identities Backdoor access Real-time access Question #29: Which one of the following is an example of the purpose of cable locks? They ensure a username and password is required to access the network They are used to set up devices in a wi-fi network They prevent unauthorised users accessing the network They improve the physical security of network devices Question #30: Which one of the following is NOT a means of permanent data destruction? Degaussing the drive containing the files Deleting the files off the drive Shredding your hard drive Reformatting the drive containing the data Question #31: Which one of the following can protect a computer from the risk of unwanted emails? Anti-spyware software Anti-virus software Anti-spam software Question #32: Which one of the following protects a computer from the risk of malicious programs? Anti-virus software Anti-spam software Anti-spyware software Question #33: Which one of the following describes why it is important to update antivirus software regularly To protect your computer from unwanted bulk messages To ensure the software identifies old viruses To protect your computer from all known viruses 0% « Previous UnitNext Unit »