0% found this document useful (0 votes)
4 views

ICT-1

Hands out

Uploaded by

macariofilamae
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

ICT-1

Hands out

Uploaded by

macariofilamae
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

ICT 1

I. MULTIPLE CHOICE

1. What are the three tenets of information security?

a Confidentiality, Usability, and Flexibility b. Confidentiality, Integrity, and Availability

c. Accuracy, Efficiency, and Privacy d. Integrity, Availability, and Authentication

2. Which of the following is a type of malware designed to encrypt a victim's files and demand payment
for decryption?

a. Spyware b. Ransomware

c. Trojan Horse d. Worm

3. Phishing attacks primarily exploit:

a. Software vulnerabilities b. Network configurations

c. Human psychology d. Hardware malfunctions

4. What is the primary purpose of a password manager?

a. Monitor internet activity b. Securely store and manage passwords

c. Detect phishing attempts d. Encrypt emails

5. Biometric authentication verifies identity through:

a. Usernames and passwords b. Tokens or smart cards

c. Physical characteristics like fingerprints d. Security questions

6. Which encryption method uses a pair of keys (public and private)?

a. Symmetric encryption b. Asymmetric encryption

c. Hash encryption d. Block encryption

7. What does HTTPS ensure in secure browsing?

a. Faster website loading b. Encrypted communication between browser and server

c. Prevention of all malware attacks d Secure device-to-device communication.

8. Which of the following is NOT a type of operating system?

a. Single-user, multi-task b. Multi-user, multi-task

c. Single-task, multi-user d. Real-time operating system

9. What feature allows spreadsheet software to calculate sums automatically?

a Conditional formatting b. Data visualization

c. Formulas and functions d. Pivot tables

Ang marapta ka ja mabaog itlog forevs.


ICT 1

10. In presentation software, what is the purpose of slide transitions?

a. Insert multimedia b. Add visual effects between slides

c. Adjust text formatting d. Enable slide collaboration

II. TRUE/FALSE

True 1. Information security ensures the safety and privacy of data.

True 2. A man-in-the-middle attack compromises encrypted communication.

False 3. Social engineering primarily exploits software vulnerabilities

False 4. Passwords should include easily guessable information to make them memorable.

True 5. Symmetric encryption uses the same key for encryption and decryption

False 6. Asymmetric encryption is faster than symmetric encryption

False 7. Biometric authentication is impossible to compromise.

False 8. Using public Wi-Fi without a VPN is generally safe for sensitive activities

True 9. Strong passwords and authentication reduce cyberattack risks.

True 10. HTTPS encrypts communication between a user's browser and the web server.

True 11. A denial-of-service (DoS) attack aims to make systems unavailable

False 12. Google Docs is an example of spreadsheet software.

True 13. Presentation software is used primarily for creating slide shows.

False 14. An operating system does not manage hardware resources

False 15. Multi-user operating systems allow only one user at a time.

True 16. The digital divide refers to the unequal access to technology.

False 17. Social media platforms are only for personal use and not professional engagement.

True 18. Email etiquette involves using clear subject lines and professional tone.

True 19. Multi-factor authentication increases account security.

False 20. Phishing attacks cannot be prevented through user awareness.

II. IDENTIFICATION

1. The process of verifying a user's identity.

-Authentication

2. A security model that assumes no one is implicitly trusted.

-Zero-Trust Architecture

Ang marapta ka ja mabaog itlog forevs.


ICT 1

3. Software designed to harm or exploit computer systems.

-Malware

4. The malicious software that encrypts files and demands payment

-Ransomware

5. Attacks exploiting vulnerabilities unknown to vendors.

-Zero-day Exploits

6. A system's ability to ensure data is available when needed

-Availability

7. Software for creating and editing test documents

-Word Processor

8. Encryption method using a single key

-Symmetric Encryption

9. A free and open-source spreadsheet software

-LibreOffice Writer

10. The ethical practice of respecting others' creative work

-Copyright

11. Visual effects added between presentation slides.

-Slide Transitions and Animations

12. Security measure that encrypts internet traffic on public networks

- VPN/Virtual Private Network

13. A professional email salutation for superior users

- Dear, Dr. Smith

14. Phishing tactic involving creating a false scenario to gain trust

-Pretexting

15. An application used to send and receive emails

-Email Client

16. The principle that data should only be accessible to authorized

-Confidentiality

17. Software ensuring correct file organization and access on storage.

Ang marapta ka ja mabaog itlog forevs.


ICT 1

-File Manager

19. A widely used online presentation software by Google

-Google Slides

18. Attacks that overwhelm a target system with excessive traffic

- Denial of Service (DoS) Attacks

20. A software feature that auto-fills complex passwords

-Password Manager

21. The process of turning plaintext into unreadable ciphertext.

-Encryption

22. A fast and popular web browser developed by Google

-Google Chrome

23. The software that helps teams organize tasks and collaborate

24. The gap between those who have access to technology and those who don’t.

-Digital Divide

25. The software acting as an intermediary between the user and computer hardware

-Operating System

III. Read each scenario carefully and write the specific threat described in the space provided.

26. Scenario: You notice that an application on your computer is replicating itself and spreading to other
devices in your network without any manual intervention.

Question: What type of malware does this scenario describe?

Answer:

27. Scenario: An employee receives an email claiming to be from the IT department, requesting login
credentials to "resolve an issue." They click the link provided and input their details.

Question: What type of threat is demonstrated in this scenario?

Answer:

28. Scenario: A staff member downloads a free application from the internet that secretly records their
keystrokes and sends the data to an attacker.

Question: Identify this type of malicious software.

Answer:

Ang marapta ka ja mabaog itlog forevs.


ICT 1

29. Scenario: While accessing a website, a user encounters a malicious script that redirects them to a
fraudulent login page designed to steal their credentials.

Question: What kind of attack does this describe?

Answer:

30. Scenario: An organization's server is overwhelmed with traffic from multiple sources, making it
impossible for legitimate users to access the service.

Answer:

Question: What type of attack is the organization experiencing?

31. Scenario: A hacker exploits a vulnerability in a company's web application to execute unauthorized
database queries, extracting sensitive customer information.

Question: What type of attack is this?

Answer:

32. Scenario: During communication between a user and an online service, a malicious actor intercepts
and manipulates the data being transmitted

Answer:

Question: What type of attack is this?

33. Scenario: An organization is targeted by an attacker who exploits an unpatched vulnerability in


software that the company was unaware of.

Answer:

Question: What type of threat does this represent?

34. Scenario: A disgruntled former employee with administrative access downloads sensitive company
files and shares them with competitors.

Question: What kind of threat is this?

Answer:

35. Scenario: A hurricane damages the data center of a financial institution, causing significant
disruption to its operations.

Question: What type of threat does this scenario illustrate?

Answer:

Ang marapta ka ja mabaog itlog forevs.

You might also like