0% found this document useful (0 votes)
155 views9 pages

CTC 311 Questions and Answers

The document consists of practice questions covering various topics related to privacy, data protection, cybersecurity, intellectual property, online behavior, and ethical decision-making in IT. Each question is paired with an answer and an explanation, providing essential knowledge on issues such as online privacy, malware, data encryption, and legal measures against cybercrime. It serves as a comprehensive resource for understanding key concepts and best practices in the digital landscape.

Uploaded by

Gerald Egwudo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
155 views9 pages

CTC 311 Questions and Answers

The document consists of practice questions covering various topics related to privacy, data protection, cybersecurity, intellectual property, online behavior, and ethical decision-making in IT. Each question is paired with an answer and an explanation, providing essential knowledge on issues such as online privacy, malware, data encryption, and legal measures against cybercrime. It serves as a comprehensive resource for understanding key concepts and best practices in the digital landscape.

Uploaded by

Gerald Egwudo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CTC 311 PRACTICE QUESTIONS

Privacy and Data Protection

1. Question: Online privacy refers to the right to control personal information shared on the
internet and safeguard it from ______ access.
Answer: unauthorized
Explanation: Unauthorized access refers to someone accessing your data without
permission, which is a key concern in online privacy.

2. Question: A strong password should be at least ______ characters long.


Answer: 12
Explanation: A password of at least 12 characters is recommended to ensure it is strong and
secure.

3. Question: Always look for "______" in the URL to ensure a secure connection.
Answer: https://
Explanation: "https://" indicates a secure connection, encrypting data during transmission.

4. Question: Phishing is a deceptive tactic used by cybercriminals to obtain sensitive


information such as ______ credentials.
Answer: login
Explanation: Phishing often targets login credentials to gain unauthorized access to
accounts.

5. Question: Regularly updating your operating system and security software helps protect
against ______.
Answer: vulnerabilities
Explanation: Updates patch security vulnerabilities that could be exploited by attackers.

6. Question: Public Wi-Fi networks are often ______ and should be avoided for sensitive
transactions.
Answer: insecure
Explanation: Public Wi-Fi networks are typically unsecured, making them risky for sensitive
activities.

7. Question: A ______ can encrypt your internet connection when using public Wi-Fi.
Answer: VPN
Explanation: A VPN (Virtual Private Network) encrypts your connection, adding a layer of
security.

8. Question: Social media privacy settings allow you to control who can see your ______.
Answer: posts
Explanation: Privacy settings help manage who can view your social media posts.
9. Question: Educating children about internet safety helps them recognize potential ______.
Answer: dangers
Explanation: Awareness of online dangers is crucial for children to navigate the internet
safely.

10. Question: Reporting inappropriate content to platform administrators helps maintain a safe
______ environment.
Answer: online
Explanation: Reporting ensures that harmful content is removed, contributing to a safer
online space.

Cybersecurity

11. Question: Cybersecurity aims to protect the confidentiality, ______, and availability of data.
Answer: integrity
Explanation: Integrity ensures that data remains accurate and unaltered.

12. Question: A ______ attack overwhelms servers or networks, causing service disruptions.
Answer: DoS
Explanation: Denial-of-Service (DoS) attacks aim to make services unavailable by
overwhelming them.

13. Question: Malware is a broad term that includes viruses, worms, and ______ horses.
Answer: Trojan
Explanation: Trojan horses are a type of malware that masquerades as legitimate software.

14. Question: A ______ is a malicious program that replicates itself but does not alter files.
Answer: worm
Explanation: Worms spread across networks without modifying files.

15. Question: Ransomware encrypts data and demands a ______ for decryption.
Answer: ransom
Explanation: Ransomware locks data and demands payment for its release.

16. Question: A ______ is a type of malware that covertly collects sensitive information.
Answer: spyware
Explanation: Spyware is designed to gather data without the user's knowledge.

17. Question: A ______ virus infects both program files and system sectors.
Answer: multipartite
Explanation: Multipartite viruses can infect multiple parts of a system.

18. Question: Antivirus software uses ______ files to detect known threats.
Answer: signature
Explanation: Signature files contain patterns of known malware for detection.

19. Question: A ______ virus changes its code each time it infects a file.
Answer: polymorphic
Explanation: Polymorphic viruses alter their code to avoid detection.

20. Question: A ______ virus embeds itself in a computer's memory and executes when the
system loads.
Answer: resident
Explanation: Resident viruses remain in memory and activate during system operations.

Intellectual Property and Copyright

21. Question: ______ refers to the exclusive rights granted to the creator of original work.
Answer: Copyright
Explanation: Copyright protects the creator's rights over their work.

22. Question: ______ is the act of stealing someone else's work and presenting it as your own.
Answer: Plagiarism
Explanation: Plagiarism involves using someone else's work without proper attribution.

23. Question: Intellectual property rights protect ______ assets like inventions and creative
works.
Answer: intangible
Explanation: Intellectual property covers non-physical creations like ideas and designs.

24. Question: The ______ Act 1988 protects against the unauthorized use of copyrighted
material.
Answer: Copyright
Explanation: The Copyright Act provides legal protection for original works.

25. Question: ______ is the practice of using someone else's identity online without permission.
Answer: Impersonation
Explanation: Impersonation involves pretending to be someone else, often for malicious
purposes.

Social Media and Online Behavior

26. Question: The ______ concept emphasizes that once content is posted online, it cannot be
completely removed.
Answer: No Take Backs
Explanation: The "No Take Backs" concept highlights the permanence of online content.

27. Question: Social media platforms like Facebook allow users to adjust ______ settings to
control who can see their posts.
Answer: privacy
Explanation: Privacy settings help users manage who can view their content.

28. Question: ______ is the act of publicly revealing someone's private information online.
Answer: Doxing
Explanation: Doxing involves sharing personal information without consent.

29. Question: ______ is a form of online harassment that involves sending hurtful messages.
Answer: Cyberbullying
Explanation: Cyberbullying includes sending harmful or threatening messages.

30. Question: ______ is the practice of manipulating someone into sharing sensitive
information.
Answer: Grooming
Explanation: Grooming involves building trust to exploit someone, often for malicious
purposes.

Data Protection and Security

31. Question: The ______ Act 2018 governs how personal data is used in the UK.
Answer: Data Protection
Explanation: The Data Protection Act regulates the handling of personal data.

32. Question: Personal data must be processed ______, lawfully, and transparently.
Answer: fairly
Explanation: Fair processing is a key principle of data protection.

33. Question: Sensitive data such as health information is protected by ______ laws.
Answer: stronger
Explanation: Sensitive data requires enhanced protection under data protection laws.

34. Question: The ______ Regulation (GDPR) is a comprehensive data protection law in the EU.
Answer: General Data Protection
Explanation: GDPR sets strict rules for data protection and privacy.

35. Question: Data ______ ensures that information is accessible when needed.
Answer: availability
Explanation: Availability ensures that data is accessible to authorized users.

Network Security

36. Question: A ______ firewall monitors and controls incoming and outgoing network traffic.
Answer: network
Explanation: Firewalls protect networks by filtering traffic.

37. Question: ______ is a protocol that encrypts data transmitted over the internet.
Answer: IPsec
Explanation: IPsec provides secure communication over IP networks.

38. Question: A ______ attack involves redirecting users to fake websites to steal information.
Answer: pharming
Explanation: Pharming redirects users to malicious sites to harvest data.

39. Question: ______ is a protocol that provides secure communication over the internet.
Answer: SSL/TLS
Explanation: SSL/TLS encrypts data to ensure secure communication.

40. Question: A ______ attack exploits weaknesses in network protocols like DNS.
Answer: DoS
Explanation: DoS attacks target network protocols to disrupt services.

Malware and Threats


41. Question: A ______ virus infects executable files and spreads when the file is executed.
Answer: file infector
Explanation: File infector viruses attach themselves to executable files.

42. Question: ______ is a type of malware that spreads through email attachments.
Answer: Worm
Explanation: Worms often spread via email attachments or network shares.

43. Question: A ______ virus embeds itself in the boot sector of a computer.
Answer: boot sector
Explanation: Boot sector viruses infect the boot sector of a hard drive.

44. Question: ______ is a type of malware that displays unwanted advertisements.


Answer: Adware
Explanation: Adware generates pop-up ads and can track user behavior.

45. Question: A ______ virus hijacks web browser functions and redirects users to malicious
sites.
Answer: browser hijacker
Explanation: Browser hijackers alter browser settings to redirect users.

Ethical Decision-Making

46. Question: Ethical decision-making in IT involves promoting ______, accountability, and


professionalism.
Answer: fairness
Explanation: Fairness is a key principle in ethical IT practices.

47. Question: Ethical behavior in IT requires responsible handling of ______ information.


Answer: sensitive
Explanation: Sensitive information must be handled with care to maintain privacy.

48. Question: Promoting ______ in IT practices helps build trust with users.
Answer: integrity
Explanation: Integrity ensures that IT systems are reliable and trustworthy.

49. Question: Ethical IT practices involve respecting ______ property rights.


Answer: intellectual
Explanation: Intellectual property rights protect creators' works.

50. Question: Ethical decision-making in IT requires considering the ______ implications of


technology.
Answer: moral
Explanation: Moral implications involve evaluating the ethical impact of technology.

Online Scams and Frauds

51. Question: ______ scams promise unrealistic returns to entice victims to invest money.
Answer: Investment
Explanation: Investment scams lure victims with promises of high returns.
52. Question: ______ is the fraudulent practice of sending emails to trick recipients into
revealing personal information.
Answer: Phishing
Explanation: Phishing emails often impersonate legitimate organizations.

53. Question: ______ is the act of redirecting users to fake websites to steal information.
Answer: Pharming
Explanation: Pharming involves redirecting users to malicious sites.

54. Question: ______ is the unauthorized access to data stored in a system or online account.
Answer: Hacking
Explanation: Hacking involves gaining unauthorized access to systems or data.

55. Question: ______ is the practice of using someone else's identity for fraudulent purposes.
Answer: Identity theft
Explanation: Identity theft involves stealing personal information to commit fraud.

Parental Controls and Child Safety

56. Question: Parental controls can block or filter ______ content for children.
Answer: inappropriate
Explanation: Parental controls help restrict access to unsuitable content.

57. Question: ______ settings on devices can limit screen time for children.
Answer: Time-out
Explanation: Time-out settings restrict device usage after a certain period.

58. Question: Parental controls can prevent children from accessing ______ websites.
Answer: harmful
Explanation: Parental controls block access to harmful or inappropriate sites.

59. Question: ______ controls can restrict app purchases on children's devices.
Answer: Parental
Explanation: Parental controls can prevent unauthorized app purchases.

60. Question: ______ settings on social media platforms can limit who can contact children.
Answer: Privacy
Explanation: Privacy settings help control who can interact with children online.

Data Encryption and Security

61. Question: ______ encryption scrambles data so that only authorized users can read it.
Answer: Data
Explanation: Data encryption protects information from unauthorized access.

62. Question: ______ is a method of encrypting files and folders on NTFS partitions.
Answer: EFS
Explanation: EFS (Encrypting File System) provides file-level encryption.
63. Question: ______ encryption protects data stored on entire disk drives.
Answer: Disk
Explanation: Disk encryption secures all data on a storage device.

64. Question: ______ is a technique that hides data within other files, such as images or audio.
Answer: Steganography
Explanation: Steganography conceals data within other files to avoid detection.

65. Question: ______ encryption uses public and private keys to secure data.
Answer: Asymmetric
Explanation: Asymmetric encryption uses a pair of keys for secure communication.

Network Protocols and Vulnerabilities

66. Question: The ______ protocol translates human-readable hostnames into IP addresses.
Answer: DNS
Explanation: DNS (Domain Name System) resolves domain names to IP addresses.

67. Question: ______ is a protocol that provides reliable, ordered delivery of data packets.
Answer: TCP
Explanation: TCP (Transmission Control Protocol) ensures reliable data transmission.

68. Question: ______ is a protocol that provides encryption for IP traffic.


Answer: IPsec
Explanation: IPsec (Internet Protocol Security) encrypts data for secure communication.

69. Question: ______ is a protocol that provides secure communication over HTTP.
Answer: HTTPS
Explanation: HTTPS (Hypertext Transfer Protocol Secure) encrypts web traffic.

70. Question: ______ is a protocol that provides end-to-end security for email communication.
Answer: SSL/TLS
Explanation: SSL/TLS (Secure Sockets Layer/Transport Layer Security) secures email
communication.

Cybercrime and Legal Measures

71. Question: The ______ Act 1990 criminalizes unauthorized access to computer systems.
Answer: Computer Misuse
Explanation: The Computer Misuse Act addresses hacking and unauthorized access.

72. Question: The ______ Act 2010 prohibits discrimination based on protected characteristics.
Answer: Equality
Explanation: The Equality Act protects against discrimination in various contexts.

73. Question: The ______ Act 1988 criminalizes sending offensive or threatening
communications.
Answer: Malicious Communications
Explanation: The Malicious Communications Act addresses harmful online behavior.
74. Question: The ______ Act 1997 protects individuals from repeated harassment.
Answer: Protection from Harassment
Explanation: The Protection from Harassment Act addresses stalking and harassment.

75. Question: The ______ Act 2003 regulates electronic communications and online behavior.
Answer: Communications
Explanation: The Communications Act governs electronic communications in the UK.

Backup and Data Recovery

76. Question: Regularly backing up data protects against ______ loss.


Answer: data
Explanation: Backups ensure data can be recovered in case of loss.

77. Question: Backing up data to an ______ location protects against physical damage.
Answer: offsite
Explanation: Offsite backups protect data from local disasters like fires.

78. Question: ______ is the process of creating copies of data for recovery purposes.
Answer: Backup
Explanation: Backups are essential for data recovery in case of failure.

79. Question: ______ backups can be scheduled to run automatically at regular intervals.
Answer: Automated
Explanation: Automated backups ensure data is regularly saved without manual
intervention.

80. Question: Backing up data to ______ storage services provides remote access to files.
Answer: online
Explanation: Online backups allow access to data from any location.

Social Engineering and Phishing

81. Question: ______ engineering exploits human psychology to manipulate individuals into
revealing sensitive information.
Answer: Social
Explanation: Social engineering relies on psychological manipulation.

82. Question: ______ is a common phishing tactic where attackers impersonate trusted entities.
Answer: Spoofing
Explanation: Spoofing involves faking the identity of a trusted source.

83. Question: ______ emails often create a sense of urgency to trick recipients into taking
action.
Answer: Phishing
Explanation: Phishing emails use urgency to pressure victims into responding.

84. Question: ______ is a phishing technique that uses misspelled URLs to deceive users.
Answer: Typosquatting
Explanation: Typosquatting relies on common misspellings of legitimate URLs.
85. Question: ______ is a phishing method that uses fake websites to steal login credentials.
Answer: Spoofing
Explanation: Spoofing involves creating fake websites that mimic legitimate ones.

Hardware Security

86. Question: ______ Trojans are malicious modifications made to electronic devices.
Answer: Hardware
Explanation: Hardware Trojans are malicious alterations to hardware components.

87. Question: ______ attacks exploit physical information like power consumption to leak
sensitive data.
Answer: Side-channel
Explanation: Side-channel attacks analyze physical characteristics to extract data.

88. Question: ______ hardware devices are designed to resist tampering and unauthorized
access.
Answer: Tamper-resistant
Explanation: Tamper-resistant hardware prevents physical tampering.

89. Question: ______ is a technique used to conceal the functionality of electronic hardware.
Answer: Obfuscation
Explanation: Obfuscation hides the true purpose of hardware components.

90. Question: ______ is a method of embedding ownership information in hardware designs.


Answer: Watermarking
Explanation: Watermarking identifies the owner of hardware designs.

Software Vulnerabilities

91. Question: ______ overflow occurs when a program tries to store more data in a buffer than
it can hold.
Answer: Buffer
Explanation: Buffer overflow exploits can corrupt adjacent memory.

92. Question: ______ injection is a common attack that exploits vulnerabilities in web
applications.
Answer: SQL
Explanation: SQL injection targets databases through malicious queries.

93. Question: ______ conditions occur when the output of a process depends on the timing of
events.
Answer: Race
Explanation: Race conditions can lead to unpredictable behavior in software.

94. Question: ______ validation ensures that input data follows specific rules.
Answer: Input
Explanation: Input validation prevents

You might also like