Uploaded by Atariiiaa

Computer Misuse

advertisement
HAMPTON SCHOOL
INFORMATION TECHNOLOGY
COMPUTER MISUSE MONTHLY TEST
Date: ________________________________
NAME:________________________________
FORM:__________
DURATION:1 hour
Instruction: Multiple Choice -Choose the best answer to each question ( 10 marks)
1. The process of scrambling messages
at the sending end and unscrambling
them at the receiving end is called:
a. Coding
b. Espionage
c. Encryption
d. Eavesdropping
2. An official of Company X sells
confidential information about his
company to Company Y. What is the
term used for this type of information
misuse?
a. Identity theft
b. Computer fraud
c. Industrial espionage
d. Electronic eavesdropping
3. Unauthorized, real-time interception
of private communication on a
computer network is referred to as:
a. Propaganda
b. Identity theft
c. Industrial espionage
d. Electronic eavesdropping
4. The introduction of communication
by means of means of computers has
REDUCED
the
employment
opportunities of which of the
following groups of workers?
a. Messengers and Postal Workers
b. Analysts and Programmers
c. Software Testers and Trainers
d. Web Masters and Developers
5. The illegal copying and selling of
programs is referred to as:
a. Propaganda
b. Software piracy
c. Computer fraud
d. Industrial espionage
6. What is the main purpose of
propaganda on social media?
a. Propagate good personal security
b. Profile a user with the intention to
steal their identity
c. Influence persons to adopt an idea
d. Bully or embarrass a person
7. Which of the following operations is
considered a feature of a biometric
system?
a. Matching fingerprints
b. Detecting irregular heartbeats
c. Diagnosing medical symptoms
e. Lubricating skeletal joints
8. Which of these is NOT an element of
computer risk assessment?
a. Vulnerability
b. Threat
c. Decision
d. Attack
9. Music piracy is an example of
computer misuse. To which category
of computer misuse does music
piracy belong?
a. Identity theft
b. Phishing attack
c. Data theft
d. Copyright infringement
10. What best describes a malicious
program on a computer system?
a. General-purpose program
b. A system program
c. A virus program
d. A utility program
SHORT ANSWER QUESTION (marks)
11. (a) Define the term ‘computer vulnerability’. (2 marks)
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
(b) Complete the table by classifying EACH of the following vulnerabilities as an internal
source or an external source. (4 marks)
Vulnerability
Natural disasters such as floods, hurricanes, and
earthquakes.
Employees erroneously erasing or overwriting
data
Lack of anti-virus software to scan email
attachments.
Source
Damage to hardware and software from
electrical power surges and spikes.
(c) Computer users can be the greatest threat to a company’s computer security. State
TWO examples of strategies used to mitigate threats from users. (2 marks)
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
(d) Distinguish between the terms ‘computer security’ and ‘cybersecurity’. ( 4 marks)
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
( e) Criminals acquire credit and debit card details from unsuspecting people and use this
information to make fraudulent purchases and cash transactions.
(i)
State the term used to describe the scenario above. (1 mark)
______________________________________________________________
(ii)
Outline TWO appropriate methods which can be used to prevent the scenario
above. ( 2 marks)
______________________________________________________________
______________________________________________________________
12. Match the following professions with their description. (5 marks)
Professions: Network Engineer, Computer Programmer, Computer Support
Specialist, Social Media Specialist, Web Developer
ANSWER
DESCRIPTION
Writes programs based on specifications, prepare
documentation and maintains existing software.
Responsible for planning and implementing social media
strategies for company’s.
Assist users who have problems with their computer
systems.
Takes a web design from a client and turns it into an
operational website.
Responsible for designing and implanting computer
networks (LAN, MAN, and WAN)
13. Question 13 is based on the items shown below as Figures 1-3.
The items shown are countermeasures used by a small business to keep its computer system. ( 2 marks)
(a) State which of the items displayed are:
(i)
A physical countermeasure _____________________________________________
(ii)
A software countermeasure _____________________________________________
b. Outline how EACH item may be incorporated into a strategy to minimize data theft from a
computer located in an office accessible by all employees. ( 6 marks)
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
TOTAL MARK 38
ALL THE BEST!!!
Download