Sorry, but you're not allowed to access this unit.
Module 2: I.T Security
Question #1: Which one of the following is a type of cybercrime?
Question #2: Which one of the following best describes the term ethical hacking?
Question #3: Which one of the following best describes a worm?
Question #4: Which one of the following can be used as a measure to help prevent unauthorised data access?
Question #5: Which one of the following best describes the act of pharming?
Question #6: Which one of the following best describes the information security characteristic of integrity?
Question #7: Which one of the following describes why firewalls are used?
Question #8: Which one of the following is considered a direct result of social engineering?
Question #9: Which one of the following best describes the term malware?
Question #10: Which one of the following could be used as a means to conceal malware?
Question #11: Which one of the following best describes a botnet?
Question #12: Which one of the following is a limitation of anti-virus software?
Question #13: Which one of the following best describes the act of ensuring files cannot harm the system by isolating them?
Question #14: Which one of the following is a type of network that provides remote users with secure access to their organisation's network?
Question #15: Which one of the following is used to prevent unauthorised access to a network from outside sources?
Question #16: Which one of the following icons represents a cable network that you could connect to?
Question #17: Which one of the following is required when you access a network account?
Question #18: Which one of the following is an example of a biometric technique used for access control?
Question #19: Which one of the following is considered good practice for online shopping?
Question #20: Which one of the following identifies a web page as being secure?
Question #21: Which one of the following is text-based information stored by your web browser when you visit a website?
Question #22: Which one of the following is a type of data that can be deleted through the browser?
Question #23: Which one of the following is a setting that can NOT be modified when using a social networking site?
Question #24: Which one of the following best describes the purpose of e-mail encryption?
Question #25: Which one of the following best describes the purpose of a digital signature?
Question #26: Which one of the following is the term used for illegal online activity involving misleading someone about your identity in order to gain valuable information?
Question #27: Which one of the following should be considered a security threat when opening e-mail attachments?
Question #28: Which one of the following is considered a vulnerability of instant messaging?
Question #29: Which one of the following is an example of the purpose of cable locks?
Question #30: Which one of the following is NOT a means of permanent data destruction?
Question #31: Which one of the following can protect a computer from the risk of unwanted emails?
Question #32: Which one of the following protects a computer from the risk of malicious programs?
Question #33: Which one of the following describes why it is important to update antivirus software regularly
0%