0% found this document useful (0 votes)
20 views5 pages

Information Systems 1 Ext y2 Test 1_2024

IS2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views5 pages

Information Systems 1 Ext y2 Test 1_2024

IS2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

TEST 1: 10 May 2024

SUBJECT : INFORMATION SYSTEMS 1 Extended year 2


SUBJECT CODE : IS15WO 1B
QUALIFICATION : DIPLOMA IN ICT IN APPLICATION
DEVELOPMENT
: DIPLOMA IN ICT IN BUSINESS ANALYSIS

EXAMINERS : MS. M. MOKOKA

MODERATOR : Dr. K. Koranteng


DURATION : 1 hour 30 mins
MARKS : 50
NUMBER OF PAGES : 5 (incl. cover page)

INSTRUCTIONS:

 No student is allowed to borrow equipment from another student


 Questions must be referred to the invigilator or subject lecturer only
 All questions should be answered on the answer sheet provided
 Smartphones must be switched off or on silent (not vibrate)
Question 1 : Multiple Choice 15
MARKS]
1. Any event or action that could cause a loss of or damage to computer or
mobile device hardware or software.
A. Cybercriminal
B. Green computing
C. Digital security risk
D. Online perpetrators
2. Online or internet-based illegal acts such as distributing malicious software or
committing identity theft.
A. Cybercrime
B. Hacker
C. Cracker
D. Online perpetrator
3. Someone who access a computer or network illegally.
A. Trojan horse
B. Hacker
C. Cyberextortions
D. Cybercriminals
4. Hacker that uses prewritten hacking and cracking programs to break into
computers and networks.
A. Corporate Spy
B. Cracker
C. Hacker
D. Script kiddie
5. Programs that act without a user’s knowledge and deliberately alter the
operations of computers and mobile devices.
A. Malware
B. Adware
C. Virus
D. Worms
6. Encrypted code that a person, website, or organization attaches to an
electronic message to verify the identity of the message sender.
A. Digital certificate
B. Digital signature
C. Differential backup
D. Selective backup
7. Process of converting data that is readable by humans into encoded
characters to prevent unauthorized access.
A. Technology ethics
B. Encryption
C. Plaintext
D. Cypher
8. Legal agreement that permits users to install the software on multiple
computers usually at a volume discount.
A. Site license
B. User license
C. Software license
D. Network license
9. The authorized and illegal duplication of copyrighted software.
A. Off-site
B. Stolen software
C. Piracy
D. Encryption
10.The discovery, collection, and analysis of evidence found on computers and
networks.
A. Evidence analysis
B. Investigative forensic
C. Digital forensic
D. Software piracy
11.It occurs when someone steals software media, intentionally erases
programs, illegal registers and/or activates a program, or illegal copies
software.
A. Software theft
B. Piracy
C. Keygen
D. Network license
12.System that captures a live face image and compares it with a stored image
to determine if a person is a legitimate user.
A. Hand geometry system
B. Signature verification system
C. Face recognition system
D. Voice verification system
13.A numeric password, either assigned by a company or selected by a user that
provide security.
A. Biometrics
B. Password
C. Passphrase
D. PIN
14.Security measures that define who can access a computer, device, or
networks, when they can access it, and what action they can take while
accessing it.
A. Authorized access
B. Access controls
C. Security controls
D. Authorized controls
15.Unique combination of characters, such as letters of the alphabet or numbers
that identifies one specific users.
A. Passphrase
B. Password
C. Username
D. Keygen
Question 2: TRUE/FALSE [15
MARKS]

1. Any illegal act involving the use of a computer, or related devices


generally is referred to as crimeware.
2. When data is traveling to or from a computer to a cloud service, it is
subject to interception.
3. It is illegal for employers to use software programs that monitors
employees.
4. A rootkit displays an online advertisement in a banner or pop-up window
on webpages, email or other Internet services.
5. Unencrypted, readable data is called ciphertext.
6. A typical license agreement allows you to rent or lease the software.
7. An audit trail records in a file both successful and unsuccessful access
attempts.
8. Perpetrators of back doors trick their victims into interacting with phony
websites.
9. Secure sites typically use digital certificates along with security protocols.
10.If your computer’s operating system provides a personal firewall, you do
not need to disable it if you are using a third-party firewall.
11.User IDs are also called usernames, log on names, or sign-in names.
12.A password manager is a management tool that allows hackers to have
access to individual’s sensitive information.
13.Employer can use firewalls to restrict employees access to sensitive data.
14.Intellectual property rights are rights which allow anyone to have access
or use the creator’s idea, invention or process without the owner’s
permission.
15.Content filtering is the process of restricting access to certain materials.
Question 3 : OPEN-ENDED QUESTIONS
20 MARKS]
1. Define the term, social engineering.
[1]
2. Differentiate among zombie, botnet, and bot.
[3]
3. What is the purpose of a back door? How do attackers use it to infect your
computer?[4]
4. Mention any four (4) sample IT Code of Conduct that helps determine
whether a specification is ethical/unethical or allowed/not allowed.
[4]
5. Explain what happens during IP and address spoofing.
[3]
6. List any five (5) steps to protect yourself from viruses and other malware.
[5]

You might also like