We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
TEST 1: 10 May 2024
SUBJECT : INFORMATION SYSTEMS 1 Extended year 2
SUBJECT CODE : IS15WO 1B QUALIFICATION : DIPLOMA IN ICT IN APPLICATION DEVELOPMENT : DIPLOMA IN ICT IN BUSINESS ANALYSIS
EXAMINERS : MS. M. MOKOKA
MODERATOR : Dr. K. Koranteng
DURATION : 1 hour 30 mins MARKS : 50 NUMBER OF PAGES : 5 (incl. cover page)
INSTRUCTIONS:
No student is allowed to borrow equipment from another student
Questions must be referred to the invigilator or subject lecturer only All questions should be answered on the answer sheet provided Smartphones must be switched off or on silent (not vibrate) Question 1 : Multiple Choice 15 MARKS] 1. Any event or action that could cause a loss of or damage to computer or mobile device hardware or software. A. Cybercriminal B. Green computing C. Digital security risk D. Online perpetrators 2. Online or internet-based illegal acts such as distributing malicious software or committing identity theft. A. Cybercrime B. Hacker C. Cracker D. Online perpetrator 3. Someone who access a computer or network illegally. A. Trojan horse B. Hacker C. Cyberextortions D. Cybercriminals 4. Hacker that uses prewritten hacking and cracking programs to break into computers and networks. A. Corporate Spy B. Cracker C. Hacker D. Script kiddie 5. Programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices. A. Malware B. Adware C. Virus D. Worms 6. Encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender. A. Digital certificate B. Digital signature C. Differential backup D. Selective backup 7. Process of converting data that is readable by humans into encoded characters to prevent unauthorized access. A. Technology ethics B. Encryption C. Plaintext D. Cypher 8. Legal agreement that permits users to install the software on multiple computers usually at a volume discount. A. Site license B. User license C. Software license D. Network license 9. The authorized and illegal duplication of copyrighted software. A. Off-site B. Stolen software C. Piracy D. Encryption 10.The discovery, collection, and analysis of evidence found on computers and networks. A. Evidence analysis B. Investigative forensic C. Digital forensic D. Software piracy 11.It occurs when someone steals software media, intentionally erases programs, illegal registers and/or activates a program, or illegal copies software. A. Software theft B. Piracy C. Keygen D. Network license 12.System that captures a live face image and compares it with a stored image to determine if a person is a legitimate user. A. Hand geometry system B. Signature verification system C. Face recognition system D. Voice verification system 13.A numeric password, either assigned by a company or selected by a user that provide security. A. Biometrics B. Password C. Passphrase D. PIN 14.Security measures that define who can access a computer, device, or networks, when they can access it, and what action they can take while accessing it. A. Authorized access B. Access controls C. Security controls D. Authorized controls 15.Unique combination of characters, such as letters of the alphabet or numbers that identifies one specific users. A. Passphrase B. Password C. Username D. Keygen Question 2: TRUE/FALSE [15 MARKS]
1. Any illegal act involving the use of a computer, or related devices
generally is referred to as crimeware. 2. When data is traveling to or from a computer to a cloud service, it is subject to interception. 3. It is illegal for employers to use software programs that monitors employees. 4. A rootkit displays an online advertisement in a banner or pop-up window on webpages, email or other Internet services. 5. Unencrypted, readable data is called ciphertext. 6. A typical license agreement allows you to rent or lease the software. 7. An audit trail records in a file both successful and unsuccessful access attempts. 8. Perpetrators of back doors trick their victims into interacting with phony websites. 9. Secure sites typically use digital certificates along with security protocols. 10.If your computer’s operating system provides a personal firewall, you do not need to disable it if you are using a third-party firewall. 11.User IDs are also called usernames, log on names, or sign-in names. 12.A password manager is a management tool that allows hackers to have access to individual’s sensitive information. 13.Employer can use firewalls to restrict employees access to sensitive data. 14.Intellectual property rights are rights which allow anyone to have access or use the creator’s idea, invention or process without the owner’s permission. 15.Content filtering is the process of restricting access to certain materials. Question 3 : OPEN-ENDED QUESTIONS 20 MARKS] 1. Define the term, social engineering. [1] 2. Differentiate among zombie, botnet, and bot. [3] 3. What is the purpose of a back door? How do attackers use it to infect your computer?[4] 4. Mention any four (4) sample IT Code of Conduct that helps determine whether a specification is ethical/unethical or allowed/not allowed. [4] 5. Explain what happens during IP and address spoofing. [3] 6. List any five (5) steps to protect yourself from viruses and other malware. [5]