Question 1: Multiple Choice [10 marks]
Circle ONLYone correct answer among the choices provided.
1. ___ is a small application, or string of code, that infects host applications. It is a programming code
that can replicate itself and spread from one system to another requiring user intervention. [1]
a) Worm
b) Backdoor
c) Spyware
d) Virus
2. The CIA triad consists of the following three main principles:
[1]
a) Confidentiality, Integrity, Authentication
b) Confidentiality, Integral, Availability
c) Confidentiality, Integrity, Availability
d) Confidentiality, Integrity, Accountability
3. Critical infrastructure is a term used by governments to describe assets that are essential for the
functioning of a society and economy. This infrastructure includes:
[1]
a) Critical sector
b) People sector
c) Food and agriculture sector
d) Rights sector
4. An original intelligible message fed into the algorithm as input is known as---~
coded message produced as output is called the
a) decryption, encryption
b) plaintext, ciphertext
c) deciphering, enciphering
d) cipher, plaintext
while the
[1]
5. If both sender and receiver use the same key, the system is referred to as:
[1]
a) Public-key encryption
b) Two-key
c) Asymmetric
d) Secret-key encryption
6. A branch of forensic science that uses scientific knowledge for collecting, analyzing, documenting,
and presenting digital evidence related to computer crime for using it in a court of law is known as:
[1]
a) Mobile forensics
b) Forensic science
c) Digital forensics
d) Network forensics
7. Which is a processes of incident response?
[1]
a) Control
b) Containment
c) Assume
d) Seizure
1