Q: Which of the following statements about information security threats in ICT use are correct?
(A) Phishing involves fraudulent messages or websites that attempt to trick users into revealing sensitive information such as passwords or bank details;
(B) Shoulder surfing refers to observing someoneβs screen or keyboard to capture confidential information like passwords or PINs;
(C) Keyloggers are programs or devices that record the keys pressed on a keyboard, often without the userβs knowledge;
(D) Installing software from unverified sources is recommended because it always improves system security and stability;
Choose the correct answer from the options given below:
Q: Which of the following statements about cryptography in ICT are correct?
(A) Cryptography is the science of protecting information by transforming it into an unreadable form;
(B) Encryption converts plaintext into ciphertext using an algorithm and a key;
(C) Decryption is the process of converting ciphertext back into readable plaintext;
(D) In secure communication, sharing private keys openly on social media is recommended for convenience;
Choose the correct answer from the options given below:
Q: Select the wrong statement(s) about ICT security and cyber ethics:
(A) Installing software updates and security patches regularly helps to fix known vulnerabilities in ICT systems;
(B) Using the same simple password for all online accounts improves convenience and therefore enhances security;
(C) Phishing emails may imitate trusted organisations to trick users into revealing personal or financial information;
(D) Public Wi-Fi networks are always safe for online banking as long as they are password protected;
Choose the correct answer from the options given below:
Q: Select the wrong statement(s) about computer viruses and malware:
(A) Malware is a general term that includes viruses, worms, trojans, ransomware and spyware;
(B) Installing and regularly updating antivirus software can help detect and remove many forms of malware;
(C) Opening email attachments from unknown senders may pose a security risk;
(D) Once a computer is connected to the Internet, it becomes permanently immune to all malware attacks;
Choose the correct answer from the options given below:
Q: Which of the following statements about email security practices are correct?
(A) Phishing emails often imitate legitimate organisations to trick users into revealing sensitive information;
(B) Users should verify links in suspicious emails before clicking by checking the actual URL destination;
(C) Opening attachments from unknown senders is always safe if the email appears urgent;
(D) Reporting suspicious emails to the institutionβs IT helpdesk can help protect other users from similar attacks;
Choose the correct answer from the options given below:
Q: Which of the following statements about digital signatures are correct?
(A) Digital signatures use public key cryptography to ensure authenticity and integrity of electronic documents;
(B) A valid digital signature helps verify the identity of the sender of an electronic message;
(C) Digital signatures are simply graphical images of handwritten signatures pasted into documents;
(D) In many e-governance systems, digital signatures are used to sign electronic forms and submissions;
Choose the correct answer from the options given below:

Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!