SECTION A: TRU EOR FALSE, AN D MULTIPLE-CHOICE QUESTIONS
This section consists of 20 questions. Answer all the questions
Each correct answer is allocated 2 Marks
Write True or False for Questions 1 to 10, or select a, b, cord for Questions 11 to 20
1. Pharming is hacking approach where cyber-criminals design fake websites or pages for
tricking or gaining additional traffic.
[2 Marks]
2. The existence of weakness in a system or network is known as vulnerability
[2 Marks]
3. Passive attacks and Active attacks are types of attacks.
[2 Marks]
4. IT security in any firm or organization is maintained and handled by CEO of th e organisation.
[2 Marks]
5. In order to ensure the security of the data/ information, we need to decrypt the data.[2 Mks]
6. Hackers usually use the computer virus to send good will messages to users. [2 Marks]
7. To protect the computer system against the hacker and different kind of viruses,
one must always keep firewall on in the computer system.
[2Marks]
8. A software program or a hardware device that filters al l data packets coming through
the internet, a network, etc, is known as Cookies.
[2 Marks]
9. Worm is considered as an unsolicited commercial email.
[2 Marks]
10. One way to prevent password attack is use of surname as password.
[2 Marks]
11. External attacks involve someone outside the------- carrying out an attack on: [2Marks]
a. Football field
b. Organisation
c. Stew
d. Potatoes
12. Since cyber attackers are now using Artificial Intelligence (Al) tools to carry out attacks, it is
essential for organisations to-------- their protection mechanism from conventional defense
to Al-based defense mechanism: a. Destroy b. Sell c. Upgrade d. Remove [2Marks]
13. One way to prevent password attack is:
[2 Marks]
a. Single username login authentication b. Biometric authentication
c. Use of surname as password
d. Use of student number as password
14. Which of the following is considered as an unsolicited commercial email?
[2 Marks]
a. Virus
b. QuickHeal c. Spam
d. Worm
15. Which software is mainly used to help users identify viruses and avoid them? [2 Marks]
a. Adware b. Malware c. Intrusion detection system d. Wormware
16. One of the following is not a function of Wireshark:
[2 Marks]
a. Used for network packet analyser
b. Software tool to monitor network
c. Capture and troubleshoot network traffic d. No real-time packet analyser
17. The solution to avoid security issues with command injection is to use _within your codes:
a. Flow control
b. Validation
c. Comments
d. Documentation [2 Marks]
18. Ransomware attacks may be described as,
[2 Marks]
a. Attackers kidnaping people for money b. Attackers kidnaping data for money
c. Attackers kidnaping animals for money d. Attackers kidnaping cell phones for money
19. One of the following is not a network attack
[2 Marks]
a. Network attacks are unauthorized actions on digital assets within an organizational network
b. Perpetrators in network attacks tend to target network perimeters to gain access to internal
systems
c. Twitter and Thread owners cage fighting
d. Violation of user privacy settings and compromise devices connected to the internet
2