SECTION A: TRUE OR FALSE, AND MULTIPLE-CHOICE QUESTIONS
This section consists of 20 questions. Answer all the questions
Each correct answer is allocated 2 Marks
Write True or False for Questions 1 to 12, and select a, b, cord for Questions 13 to 20
1. Insider attacks involve someone outside the organization carrying out an attack. [2 Marks]
2. Security refers to the mechanisms in place to protect the confidentiality and privacy of
personal information.
[2 Marks]
3. Security is the protection of information and information systems from unauthorized access,
use, disclosure, disruption, modification, or destruction in order to provide confidentiality,
integrity, and availability.
[2 Marks]
4. Additional functionalities to cater for the short comings of IPV4, includes, security,
authentication and integrity.
[2 Marks]
5. Adding malicious codes to a database query to gain unauthorized access to a web
application's database is known as MySQL injection.
[2 Marks]
6. Command injection is a database injection technique that exploits a security flaw.[2 Marks]
7. Security incidents are not a potential threat to the integrity of personally identifiable
information.
[2 Marks]
8. Using two-factor authentication is not an effective tool for securing your account.[2 Marks]
9. Cybersecurity is IT's responsibility. The everyday end-users in the office don 't need to worry
about this topic.
[2 Marks]
10. Software and application updates are not important and can just be ignored.
[2 Marks]
11. A software program or a hardware device that filters all data packets coming through
the internet, a network, etc, is known as Cookies.
[2 Marks]
12. Security is an individual's right to control the use or disclosure of personal information.[2Mks]
13. Which of the following is defined as an attempt to harm, damage or ca use threat to a system or
network?
[2 Marks]
a. Digital crime b. Threats c. System hijacking d. Cyber Attack
14. Ransomware attacks may be described as,
[2 Marks]
a. Attackers kidnaping people for money b. Attackers kidnaping data for money
c. Attackers kidnaping animals for money d. Attackers kidnaping cell phones for money
15. Which one of the following is a type of antivirus program?
a. Facebook b. Notepad c. RoofofAfrica
d. McAfee
[2 Marks]
16. To protect the computer system against hackers and different kind of viruses, one must
always keep __on in the computer system: a. Sapol b. Music Player c. Firewall d. Java IDE
[2 Marks]
17. A software program or hardware device that filters all data packets coming through the
internet, a network, etc, is known as: a. Virus b. Firewall c. Cookies d. Malware [2 Marks]
18. Which of the following do cyber attackers commonly target for fetching IP address of a
target or victim user? a) ip tracker b) emails
c) websites d) web pages [2 Marks]
19. Hackers usually use the computer virus for the following purpose, except one [2 Marks]
a. To log, monitor each and every user's actions
b. To gain access to sensitive information like user's Id and Passwords
c. To corrupt the use r's data stored in the computer system
d. To send birthday messages to users
2