0% found this document useful (0 votes)
33 views3 pages

DATA SECURITY Worksheet

This document contains Anahi Beltran's answers to a data security test consisting of 3 sections: 1) Labeling types of computer security risks such as viruses, theft, and unauthorized access. 2) A true/false section covering topics like computer addiction, crackers, and cookies. 3) Multiple choice questions about cybercrime, encryption, and legal protections for digital works.

Uploaded by

Anahi Beltran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views3 pages

DATA SECURITY Worksheet

This document contains Anahi Beltran's answers to a data security test consisting of 3 sections: 1) Labeling types of computer security risks such as viruses, theft, and unauthorized access. 2) A true/false section covering topics like computer addiction, crackers, and cookies. 3) Multiple choice questions about cybercrime, encryption, and legal protections for digital works.

Uploaded by

Anahi Beltran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Name: _________________________

Anahi Beltran TOTAL


INFORMATION TECHNOLOGY
October 24, 2023
Date: __________________________ POINTS
DATA SECURITY TEST
4-12
Class: _______
Muffles College

Section 1: Label the figure: Identify types of computer security risks.

a. Computer viruses, worms and Trojan horses d. Hardware theft


b. Information theft e. Software theft
c. System failure f. Unauthorised access and use
TOTAL 18 MARKS

C
a

B e d

Section 2: True/False: Mark T for True and F for False in the left column of the table below.
TOTAL 36 MARKS

T 1. All breaches to computer security are accidental.


T 2. A WORM hides within or looks like a legitimate program.
3. A recovery disk is a removable disk that contains an uninfected copy of key operating system
T commands and start up information that enables the computer to restart correctly.
F 4. A cracker is someone who tries to access a computer or network illegally.
T 5. A honeypot is a program designed to entice an intruder to hack into the computer.
6. Software piracy occurs when someone steals software media, intentionally erases software
T programs, or illegally copies a software program.
F 7. Noise is any unwanted signal that is mixed with the normal voltage entering the computer.
T 8. A digital certificate is a notice that guarantees a user or web site is legitimate.
T 9. A digital signature is a mathematical formula that generates code from contents of the message.
T 10. A cookie is a small text file that a Web server stores on your computer.
F 11. Web filtering software is a program that allows access to specified web sites.
F 12. Computer addiction occurs when the computer consumes someone’s entire social life.

1
Section 3: Multiple Choices: Select the best answer by circling the letter that corresponds with
the option of your choice that you think is the best answer.
TOTAL MARKS 36
1. The term cybercrime refers to 8. The ______ a file means to make a copy
_______________. of it.
a. events that damage computer a. Inoculate
hardware b. Backup
b. any illegal activities involving a c. Quarantine
computer d. Encrypt
c. Internet-based illegal acts
d. destructive events or pranks 9. The computer that is used by a hacker s
to execute a DOS or DDoS attack is
2. The _____ is the destructive event or known as __________.The user is
prank that malicious-logic programs are completely unaware that it is being used
intended to deliver. to attack another system.
a. Payload a. Bug
b. Cookie b. Cracker
c. Hash c. Spike
d. Spam d. Zombie

3. A (n) ____________ is a Web site that 10. The _______ uses encryption to secure
evaluates a computer to check for Web financial transactions on the Internet,
and e-Mail vulnerabilities. such as payment by credit card.
a. online security service a. Payment by credit card
b. certificate authority b. Secure Sockets Layer (SSL)
c. online back up service c. Underwriters Laboratories (UL)
d. digital signature standard
d. Secure Electronics Transactions
4. Physical access codes, such as locked (SET) specification
doors and windows, usually are adequate
to protect against _______. 11. A _____ gives authors and artists
a. Software piracy exclusive rights to duplicate, publish and
b. Unauthorised access sell their materials.
c. Hardware theft a. Copyright
d. All of the above b. License
c. Password
5. Software piracy continues because d. Firewall
_______________.
a. in some countries, legal protection 12. The _____ provides the same protection
for the software does not exist that covers mail and telephone
b. many buyers believe they have the communications to electronic
right to copy software communications such as voicemail.
c. software piracy is a fairly simple a. Fair Credit Reporting Act
crime to commit b. Electronic Communications Privacy
d. all of the above Act
c. Computer Matching and Privacy Act
6. Encrypted (scrambled) data is called d. Computer Fraud and Abuse Acts
__________.
a. Hypertext
b. Ciphertext
c. Subtext
d. Plaintext

7. A momentary overvoltage, called a


_______, occurs when the increase in
power lasts for less than one
millisecond.
a. Brownout
b. Spike
c. Blackout
d. Joule

2
15. Identify TWO ways to safeguard against computer viruses, worms, Trojan horses,
botnets, denial of service attacks, back doors, and spoofing. (5 Points)

Antiviruses software- Installing and regularly updating antivirus software is essential for
protecting against various types of malware, including viruses, worms and Trojan horses.

Practice safe online behavior- Practicing safe online behavior is crucial to safeguard against
various cyber threats.

16. Explain THREE options available for backing up computer resources. (5 Points)

Backup- This involves creating a copy of all the data and resources on a computer system.

Cloud Backup: It involves storing data and resources on remote servers over the internet.

Incremental Backup: Incremental backups only back up the data that has changed since the last
backup, regardless of whether it was a full or incremental backup.

You might also like