Q: Which of the following statements about cryptography in ICT are correct?
(A) Cryptography is the science of protecting information by transforming it into an unreadable form;
(B) Encryption converts plaintext into ciphertext using an algorithm and a key;
(C) Decryption is the process of converting ciphertext back into readable plaintext;
(D) In secure communication, sharing private keys openly on social media is recommended for convenience;
Choose the correct answer from the options given below:
Q: Which of the following statements about data protection and privacy in educational institutions are correct?
(A) Personal data refers to information that can identify an individual directly or indirectly;
(B) Data minimisation encourages collecting only data necessary for a specified purpose;
(C) Strong access controls can help prevent unauthorised viewing of confidential student records;
(D) Institutions may share student data with any third party for any purpose without informing students;
(E) Encryption of sensitive data reduces the risk of exposure during transmission or storage;
(F) Privacy notices should hide how data will be used so that users are not confused;
Choose the correct answer from the options given below:
Q: Which of the following statements about advanced ICT security measures in institutions are correct?
(A) Firewalls can filter incoming and outgoing network traffic based on defined security rules;
(B) Intrusion detection or prevention systems can monitor networks for suspicious activity;
(C) Using a single, shared administrator password for all systems improves accountability;
(D) Two-factor authentication adds an extra layer of security beyond username and password;
(E) Regular security audits and vulnerability assessments can identify weaknesses in ICT infrastructure;
(F) Encrypting data in transit is unnecessary if internal networks are considered trusted by default;
Choose the correct answer from the options given below:
Q: Select the wrong statement(s) about encryption and data protection:
(A) Encryption converts plaintext into ciphertext using an algorithm and a key;
(B) Encryption can protect data confidentiality during transmission over networks;
(C) In symmetric-key encryption, the sender and receiver must always use different secret keys;
(D) Many secure web protocols use encryption to safeguard user credentials and payment details;
Choose the correct answer from the options given below:

Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!