DATA SECURITY Worksheet
DATA SECURITY Worksheet
C
a
B e d
Section 2: True/False: Mark T for True and F for False in the left column of the table below.
TOTAL 36 MARKS
1
Section 3: Multiple Choices: Select the best answer by circling the letter that corresponds with
the option of your choice that you think is the best answer.
TOTAL MARKS 36
1. The term cybercrime refers to 8. The ______ a file means to make a copy
_______________. of it.
a. events that damage computer a. Inoculate
hardware b. Backup
b. any illegal activities involving a c. Quarantine
computer d. Encrypt
c. Internet-based illegal acts
d. destructive events or pranks 9. The computer that is used by a hacker s
to execute a DOS or DDoS attack is
2. The _____ is the destructive event or known as __________.The user is
prank that malicious-logic programs are completely unaware that it is being used
intended to deliver. to attack another system.
a. Payload a. Bug
b. Cookie b. Cracker
c. Hash c. Spike
d. Spam d. Zombie
3. A (n) ____________ is a Web site that 10. The _______ uses encryption to secure
evaluates a computer to check for Web financial transactions on the Internet,
and e-Mail vulnerabilities. such as payment by credit card.
a. online security service a. Payment by credit card
b. certificate authority b. Secure Sockets Layer (SSL)
c. online back up service c. Underwriters Laboratories (UL)
d. digital signature standard
d. Secure Electronics Transactions
4. Physical access codes, such as locked (SET) specification
doors and windows, usually are adequate
to protect against _______. 11. A _____ gives authors and artists
a. Software piracy exclusive rights to duplicate, publish and
b. Unauthorised access sell their materials.
c. Hardware theft a. Copyright
d. All of the above b. License
c. Password
5. Software piracy continues because d. Firewall
_______________.
a. in some countries, legal protection 12. The _____ provides the same protection
for the software does not exist that covers mail and telephone
b. many buyers believe they have the communications to electronic
right to copy software communications such as voicemail.
c. software piracy is a fairly simple a. Fair Credit Reporting Act
crime to commit b. Electronic Communications Privacy
d. all of the above Act
c. Computer Matching and Privacy Act
6. Encrypted (scrambled) data is called d. Computer Fraud and Abuse Acts
__________.
a. Hypertext
b. Ciphertext
c. Subtext
d. Plaintext
2
15. Identify TWO ways to safeguard against computer viruses, worms, Trojan horses,
botnets, denial of service attacks, back doors, and spoofing. (5 Points)
Antiviruses software- Installing and regularly updating antivirus software is essential for
protecting against various types of malware, including viruses, worms and Trojan horses.
Practice safe online behavior- Practicing safe online behavior is crucial to safeguard against
various cyber threats.
16. Explain THREE options available for backing up computer resources. (5 Points)
Backup- This involves creating a copy of all the data and resources on a computer system.
Cloud Backup: It involves storing data and resources on remote servers over the internet.
Incremental Backup: Incremental backups only back up the data that has changed since the last
backup, regardless of whether it was a full or incremental backup.