Q: Which of the following statements about password and authentication practices are correct?
(A) Strong passwords typically include a mix of letters, numbers and special characters and avoid easily guessable patterns;
(B) Using the same password for multiple services reduces security risks and is recommended;
(C) Two-factor authentication adds an extra layer of security beyond just a password;
(D) Writing passwords on sticky notes attached to the monitor is considered good security practice;
Choose the correct answer from the options given below:
Q: Which of the following statements about advanced ICT security measures in institutions are correct?
(A) Firewalls can filter incoming and outgoing network traffic based on defined security rules;
(B) Intrusion detection or prevention systems can monitor networks for suspicious activity;
(C) Using a single, shared administrator password for all systems improves accountability;
(D) Two-factor authentication adds an extra layer of security beyond username and password;
(E) Regular security audits and vulnerability assessments can identify weaknesses in ICT infrastructure;
(F) Encrypting data in transit is unnecessary if internal networks are considered trusted by default;
Choose the correct answer from the options given below:
Q: Select the wrong statement(s) about cybersecurity practices in ICT use:
(A) Using strong and unique passwords for different accounts enhances security;
(B) Two-factor authentication adds an additional layer of protection beyond the password;
(C) Sharing your password with trusted friends improves your chances of account recovery and safety;
(D) Regularly updating antivirus software helps protect against malware threats;
Choose the correct answer from the options given below:

Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!