ICT-1
ICT-1
I. MULTIPLE CHOICE
2. Which of the following is a type of malware designed to encrypt a victim's files and demand payment
for decryption?
a. Spyware b. Ransomware
II. TRUE/FALSE
False 4. Passwords should include easily guessable information to make them memorable.
True 5. Symmetric encryption uses the same key for encryption and decryption
False 8. Using public Wi-Fi without a VPN is generally safe for sensitive activities
True 10. HTTPS encrypts communication between a user's browser and the web server.
True 13. Presentation software is used primarily for creating slide shows.
False 15. Multi-user operating systems allow only one user at a time.
True 16. The digital divide refers to the unequal access to technology.
False 17. Social media platforms are only for personal use and not professional engagement.
True 18. Email etiquette involves using clear subject lines and professional tone.
II. IDENTIFICATION
-Authentication
-Zero-Trust Architecture
-Malware
-Ransomware
-Zero-day Exploits
-Availability
-Word Processor
-Symmetric Encryption
-LibreOffice Writer
-Copyright
-Pretexting
-Email Client
-Confidentiality
-File Manager
-Google Slides
-Password Manager
-Encryption
-Google Chrome
23. The software that helps teams organize tasks and collaborate
24. The gap between those who have access to technology and those who don’t.
-Digital Divide
25. The software acting as an intermediary between the user and computer hardware
-Operating System
III. Read each scenario carefully and write the specific threat described in the space provided.
26. Scenario: You notice that an application on your computer is replicating itself and spreading to other
devices in your network without any manual intervention.
Answer:
27. Scenario: An employee receives an email claiming to be from the IT department, requesting login
credentials to "resolve an issue." They click the link provided and input their details.
Answer:
28. Scenario: A staff member downloads a free application from the internet that secretly records their
keystrokes and sends the data to an attacker.
Answer:
29. Scenario: While accessing a website, a user encounters a malicious script that redirects them to a
fraudulent login page designed to steal their credentials.
Answer:
30. Scenario: An organization's server is overwhelmed with traffic from multiple sources, making it
impossible for legitimate users to access the service.
Answer:
31. Scenario: A hacker exploits a vulnerability in a company's web application to execute unauthorized
database queries, extracting sensitive customer information.
Answer:
32. Scenario: During communication between a user and an online service, a malicious actor intercepts
and manipulates the data being transmitted
Answer:
Answer:
34. Scenario: A disgruntled former employee with administrative access downloads sensitive company
files and shares them with competitors.
Answer:
35. Scenario: A hurricane damages the data center of a financial institution, causing significant
disruption to its operations.
Answer: