Professional Documents
Culture Documents
Information Technology Data Security Test Grade 11 March 2010 Section 1: Label The Figure: Identify Types of Computer Security Risks
Information Technology Data Security Test Grade 11 March 2010 Section 1: Label The Figure: Identify Types of Computer Security Risks
Information Technology Data Security Test Grade 11 March 2010 Section 1: Label The Figure: Identify Types of Computer Security Risks
INFORMATION TECHNOLOGY
Date: __________________________ %
DATA SECURITY TEST
Grade: _______ Option____________
Grade 11 March 2010
Section 2: True/False: Mark T for True and F for False in the left column of the table below.
TOTAL 12 MARKS
1
Test – Data Security – Questions taken from Discovery Computers 2004, March 2010
Section 3: Multiple Choices: Select the best answer by circling the letter that corresponds with
the option of your choice that you think is the best answer.
TOTAL MARKS 14
2
Test – Data Security – Questions taken from Discovery Computers 2004, March 2010
1. The term cybercrime refers to d. Encrypt
_______________.
a. events that damage computer 9. The computer that a hacker uses to
hardware execute a DOS or DDoS attack, known
b. any illegal activities involving a as __________ is completely unaware
computer that it is being used to attack another
c. Internet-based illegal acts system.
d. destructive events or pranks a. Bug
b. Cracker
2. The _____ is the destructive event or c. Spike
prank that malicious-logic programs are d. Zombie
intended to deliver.
a. Payload 10. The _______ uses encryption to secure
b. Cookie financial transactions on the Internet,
c. Hash such as payment by credit card.
d. Spam a. Payment by credit card
b. Secure Sockets Layer (SSL)
3. A (n) ____________ is a Web site that c. Underwriters Laboratories (UL)
evaluates a computer to check for Web standard
and e-Mail vulnerabilities. d. Secure Electronics Transactions
a. online security service (SET) specification
b. certificate authority
c. online back up service 11. A _____ gives authors and artists
d. digital signature exclusive rights to duplicate, publish and
sell their materials.
4. Physical access codes, such as locked a. Copyright
doors and windows, usually are adequate b. License
to protect against _______. c. Password
a. Software piracy d. Firewall
b. Unauthorised access
c. Hardware theft 12. The _____ provides the same protection
d. All of the above that covers mail and telephone
communications to electronic
5. Software piracy continues because communications such as voicemail.
_______________. a. Fair Credit Reporting Act
a. in some countries, legal protection b. Electronic Communications Privacy
for the software does not exist Act
b. many buyers believe they have the c. Computer Matching and Privacy Act
right to copy software d. Computer Fraud and Abuse Acts
c. software piracy is a fairly simple
crime to commit 13. Web filtering software is a program that
d. all of the above ______.
a. Restricts access to specified web
6. Encrypted (scrambled) data is called sites
__________. b. Backs up files to an online location
a. Hypertext c. Uses encryption to secure transaction
b. Ciphertext on the web
c. Subtext d. Protects against computer virus
d. Plaintext
14. ____ is inflammation of the nerve that
7. A momentary overvoltage, called a connects the forearm to the palm of the
_______, occurs when the increase in wrist.
power lasts for less than one a. Tendonitis
millisecond. b. Computer Vision Syndrome (CVS)
a. Brownout c. Internet Addiction Disorder (IAD)
b. Spike d. Carpal Tunnel Syndrome (CTS)
c. Blackout
d. Joule
3
Test – Data Security – Questions taken from Discovery Computers 2004, March 2010
Section 4: Matching: Match the terms with their definitions.
4
Test – Data Security – Questions taken from Discovery Computers 2004, March 2010
Section 6: Write a statement on ONLY 4 of the follow so as to express your views on the following IT
Code of Conduct.
Employees shall consider the social impact of programs and systems they design.
Employees always should use computers in a way that demonstrates consideration and respect for fellow
humans.
5
Test – Data Security – Questions taken from Discovery Computers 2004, March 2010