SECTIONA: TRUE OR FALSE
This section consists of 20 questions. Answer all the questions
Each correct answer is allocated 2 Marks
Write True or Falsefor Questions 1 to 20.
1. TCP/IP stands for Transmission Control Protocol/ internet prototype.
[2 Marks]
2. Using two-factor authentication is not an effective tool for securing your account. [2 Marks]
3. I have anti-virus protection, so when it comes to network security, I'm all set. [2 Marks]
4. Cybersecurity is IT's responsibility. The everyday end-users in the office don't need to worry abou·
this topic.
[2 Marks]
5. Software and application updates are not important and can just be ignored. [2 Marks]
6. Hackers usually used the computer virus to send good will messages to users. [2 Marks]
7. Security incidents are NOT a potential threat to the integrity of personally identifiable
information. [2 Marks]
8. A software program or a hardware device that filters all data packets coming through
the internet, a network, etc, is known as Cookies.
[2 Marks]
9. Security is an individual's right to control the use or disclosure of personal information.
[2 Marks]
10. Users are advised to use their first name as password.
[2 Marks]
11. A ransomware attacks may be similar to kidnapers kidnap data for money.
[2 Marks]
12. Insider attacks involve someone outside the organization carrying out an attack. [2 Marks]
13. Security refers to the mechanisms in place to protect the confidentiality and privacy of
personal information.
[2 Marks]
14. Passive attacks and Active attacks are types of attacks.
[2 Marks]
15. Security is the protection of information and information systems from unauthorized access,
use, disclosure, disruption, modification, or destruction in order to provide confidentiality,
integrity, and availability.
[2 Marks]
16. Additional functionalities to cater for the short comings of IPV4, includes, security,
authentication and integrity.
17. The class of IP Address: 099.125.15.100 is A
[2 Marks]
[2 Marks]
18. Adding malicious codes to a database query to gain unauthorized accessto a web
application's database is known as SQLinjection.
[2 Marks]
19. Command injection is a database injection technique that exploits a security flaw.[2 Marks]
20. Security incidents are NOT a potential threat to the integrity of personally identifiable
information.
(2 Marks]
2