Information Technology Data Security Test Grade 11 March 2010 Section 1: Label The Figure: Identify Types of Computer Security Risks

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 5

Name: _________________________ /60

INFORMATION TECHNOLOGY
Date: __________________________ %
DATA SECURITY TEST
Grade: _______ Option____________
Grade 11 March 2010

Section 1: Label the figure: Identify types of computer security risks.

a. Computer viruses, worms and Trojan horses b. Hardware theft


b. Information theft d. Software theft
e. System failure f. Unauthorised access and use
TOTAL MARKS 6

Section 2: True/False: Mark T for True and F for False in the left column of the table below.

1. All breaches to computer security are accidental.


2. A WORM hides within or looks like a legitimate program.
3. A recovery disk is a removable disk that contains an uninfected copy of key operating system
commands and start up information that enables the computer to restart correctly.
4. A cracker is someone who tries to access a computer or network illegally.
5. A honeypot is a program designed to entice an intruder to hack into the computer.
6. Software piracy occurs when someone steals software media, intentionally erases software
programs, or illegally copies a software program.
7. Noise is any unwanted signal that is mixed with the normal voltage entering the computer.
8. A digital certificate is a notice that guarantees a user or web site is legitimate.
9. A digital signature is a mathematical formula that generates code from contents of the message.
10. A cookie is a small text file that a Web server stores on your computer.
11. Web filtering software is a program that allows access to specified web sites.
12. Computer addiction occurs when the computer consumes someone’s entire social life.

TOTAL 12 MARKS

1
Test – Data Security – Questions taken from Discovery Computers 2004, March 2010
Section 3: Multiple Choices: Select the best answer by circling the letter that corresponds with
the option of your choice that you think is the best answer.
TOTAL MARKS 14

2
Test – Data Security – Questions taken from Discovery Computers 2004, March 2010
1. The term cybercrime refers to d. Encrypt
_______________.
a. events that damage computer 9. The computer that a hacker uses to
hardware execute a DOS or DDoS attack, known
b. any illegal activities involving a as __________ is completely unaware
computer that it is being used to attack another
c. Internet-based illegal acts system.
d. destructive events or pranks a. Bug
b. Cracker
2. The _____ is the destructive event or c. Spike
prank that malicious-logic programs are d. Zombie
intended to deliver.
a. Payload 10. The _______ uses encryption to secure
b. Cookie financial transactions on the Internet,
c. Hash such as payment by credit card.
d. Spam a. Payment by credit card
b. Secure Sockets Layer (SSL)
3. A (n) ____________ is a Web site that c. Underwriters Laboratories (UL)
evaluates a computer to check for Web standard
and e-Mail vulnerabilities. d. Secure Electronics Transactions
a. online security service (SET) specification
b. certificate authority
c. online back up service 11. A _____ gives authors and artists
d. digital signature exclusive rights to duplicate, publish and
sell their materials.
4. Physical access codes, such as locked a. Copyright
doors and windows, usually are adequate b. License
to protect against _______. c. Password
a. Software piracy d. Firewall
b. Unauthorised access
c. Hardware theft 12. The _____ provides the same protection
d. All of the above that covers mail and telephone
communications to electronic
5. Software piracy continues because communications such as voicemail.
_______________. a. Fair Credit Reporting Act
a. in some countries, legal protection b. Electronic Communications Privacy
for the software does not exist Act
b. many buyers believe they have the c. Computer Matching and Privacy Act
right to copy software d. Computer Fraud and Abuse Acts
c. software piracy is a fairly simple
crime to commit 13. Web filtering software is a program that
d. all of the above ______.
a. Restricts access to specified web
6. Encrypted (scrambled) data is called sites
__________. b. Backs up files to an online location
a. Hypertext c. Uses encryption to secure transaction
b. Ciphertext on the web
c. Subtext d. Protects against computer virus
d. Plaintext
14. ____ is inflammation of the nerve that
7. A momentary overvoltage, called a connects the forearm to the palm of the
_______, occurs when the increase in wrist.
power lasts for less than one a. Tendonitis
millisecond. b. Computer Vision Syndrome (CVS)
a. Brownout c. Internet Addiction Disorder (IAD)
b. Spike d. Carpal Tunnel Syndrome (CTS)
c. Blackout
d. Joule

8. The ______ a file means to make a copy


of it.
a. Inoculate
b. Backup
c. Quarantine

3
Test – Data Security – Questions taken from Discovery Computers 2004, March 2010
Section 4: Matching: Match the terms with their definitions.

Quarantine Recovery Disk Cracker Personal Firewall


Password Biometric device Encryption Key Certificate authority (CA)

a. Connects a user to a computer only after the computer calls back


b. Area of the hard disk that holds an infected file until the infection is
removed
c. Protects a personal computer from unauthorized intrusions.
d. Inflammation of a tendon due to some repeated motion or stress.
e. Provides a secure connection to a company’s network server.
f. Translate a personal characteristic into a digital code
g. Spyware hidden on Web pages or in e-mail messages in the form of a
graphical image.
h. Contains an uninfected copy of key commands and start up
information.
i. Someone who tries to access a computer or network illegally.
j. Company that issues and verifies digital certificates.
k. Programmed formula that a data recipient uses to decrypt ciphertext.
l. Private combination of characters associated with a user name.
TOTAL MARKS 8
Section 5: Situation response. Indicate your choice of Ethical or Unethical in the space provided.
Write a statement to justify FOR ONLY 5 of these actions (statement or situation) are Ethical (E) or
Unethical (UE). Write the # of the statement then complete your justification in the right column
E/UE Statement/Situation/Action Statement of justification
1. A company requires employees to wear badges
that track their whereabouts while at work. ………………………………………
2. A supervisor reads an employee’s e-mail. ………………………………………
3. An employee uses his computer at work to send ………………………………………
email messages to a friend. ………………………………………
4. An employee sends an email message to several
………………………………………
co-workers and blind copies his supervisor.
5. An employee forwards an e-mail message to a ………………………………………
third party without the permission of the sender. ………………………………………
6. An employee uses a computer at work to complete ………………………………………
a homework assignment for school. ………………………………………
7. The VP of your Student Council body downloads a ………………………………………
photograph from the Web and uses it in a flyer to ………………………………………
recruit other student members. ………………………………………
8. A student copies text from the Web and uses it in a
………………………………………
research paper for his English Language class.
9. An employee sends political campaign materials to ………………………………………
individuals using his or her employer’s mailing ………………………………………
list. ………………………………………
10. As an employee in the registration office, you have ………………………………………
access to student grades. You look up grades for ………………………………………
your friends, so they do not have to wait for ………………………………………
delivery of grade reports from the postal services.
………………………………………
11. An employee makes a copy of software and
installs it on her home computer. No one uses her ………………………………………
home computer while she is at work, she uses her ………………………………………
home computer only to finish projects from work. ………………………………………
12. An employee who has been laid off installs a ………………………………………
computer virus on his employer’s computer. ………………………………………
13. A student researches using only the web to write a ………………………………………
report. ………………………………………
14. In a society in which all transactions occur online
………………………………………
(a cashless society), the government tracks every
transaction you make automatically and deducts ………………………………………
taxes from your bank account. ………………………………………
15. Someone copies a well-known novel to the web
and encourages others to read it.
TOTAL MARKS 3 EACH = 15 MARKS

4
Test – Data Security – Questions taken from Discovery Computers 2004, March 2010
Section 6: Write a statement on ONLY 4 of the follow so as to express your views on the following IT
Code of Conduct.

Computers may not be used to harm other people.

Employees may not interfere with others’ computer work.

Employees may not meddle in others’ computer files.

Computers may not be used to steal.

Computers may not be used to bear false witness.

Employees may not copy or use software illegally.

Employees may not use others’ computer resources without authorization.

Employees may not use others’ intellectual property as their own.

Employees shall consider the social impact of programs and systems they design.

Employees always should use computers in a way that demonstrates consideration and respect for fellow
humans.

TOTAL MARKS 3 EACH = 12 MARKS


TOTAL MARKS 60

5
Test – Data Security – Questions taken from Discovery Computers 2004, March 2010

You might also like