CTC 311 Questions and Answers
CTC 311 Questions and Answers
1. Question: Online privacy refers to the right to control personal information shared on the
internet and safeguard it from ______ access.
Answer: unauthorized
Explanation: Unauthorized access refers to someone accessing your data without
permission, which is a key concern in online privacy.
3. Question: Always look for "______" in the URL to ensure a secure connection.
Answer: https://
Explanation: "https://" indicates a secure connection, encrypting data during transmission.
5. Question: Regularly updating your operating system and security software helps protect
against ______.
Answer: vulnerabilities
Explanation: Updates patch security vulnerabilities that could be exploited by attackers.
6. Question: Public Wi-Fi networks are often ______ and should be avoided for sensitive
transactions.
Answer: insecure
Explanation: Public Wi-Fi networks are typically unsecured, making them risky for sensitive
activities.
7. Question: A ______ can encrypt your internet connection when using public Wi-Fi.
Answer: VPN
Explanation: A VPN (Virtual Private Network) encrypts your connection, adding a layer of
security.
8. Question: Social media privacy settings allow you to control who can see your ______.
Answer: posts
Explanation: Privacy settings help manage who can view your social media posts.
9. Question: Educating children about internet safety helps them recognize potential ______.
Answer: dangers
Explanation: Awareness of online dangers is crucial for children to navigate the internet
safely.
10. Question: Reporting inappropriate content to platform administrators helps maintain a safe
______ environment.
Answer: online
Explanation: Reporting ensures that harmful content is removed, contributing to a safer
online space.
Cybersecurity
11. Question: Cybersecurity aims to protect the confidentiality, ______, and availability of data.
Answer: integrity
Explanation: Integrity ensures that data remains accurate and unaltered.
12. Question: A ______ attack overwhelms servers or networks, causing service disruptions.
Answer: DoS
Explanation: Denial-of-Service (DoS) attacks aim to make services unavailable by
overwhelming them.
13. Question: Malware is a broad term that includes viruses, worms, and ______ horses.
Answer: Trojan
Explanation: Trojan horses are a type of malware that masquerades as legitimate software.
14. Question: A ______ is a malicious program that replicates itself but does not alter files.
Answer: worm
Explanation: Worms spread across networks without modifying files.
15. Question: Ransomware encrypts data and demands a ______ for decryption.
Answer: ransom
Explanation: Ransomware locks data and demands payment for its release.
16. Question: A ______ is a type of malware that covertly collects sensitive information.
Answer: spyware
Explanation: Spyware is designed to gather data without the user's knowledge.
17. Question: A ______ virus infects both program files and system sectors.
Answer: multipartite
Explanation: Multipartite viruses can infect multiple parts of a system.
18. Question: Antivirus software uses ______ files to detect known threats.
Answer: signature
Explanation: Signature files contain patterns of known malware for detection.
19. Question: A ______ virus changes its code each time it infects a file.
Answer: polymorphic
Explanation: Polymorphic viruses alter their code to avoid detection.
20. Question: A ______ virus embeds itself in a computer's memory and executes when the
system loads.
Answer: resident
Explanation: Resident viruses remain in memory and activate during system operations.
21. Question: ______ refers to the exclusive rights granted to the creator of original work.
Answer: Copyright
Explanation: Copyright protects the creator's rights over their work.
22. Question: ______ is the act of stealing someone else's work and presenting it as your own.
Answer: Plagiarism
Explanation: Plagiarism involves using someone else's work without proper attribution.
23. Question: Intellectual property rights protect ______ assets like inventions and creative
works.
Answer: intangible
Explanation: Intellectual property covers non-physical creations like ideas and designs.
24. Question: The ______ Act 1988 protects against the unauthorized use of copyrighted
material.
Answer: Copyright
Explanation: The Copyright Act provides legal protection for original works.
25. Question: ______ is the practice of using someone else's identity online without permission.
Answer: Impersonation
Explanation: Impersonation involves pretending to be someone else, often for malicious
purposes.
26. Question: The ______ concept emphasizes that once content is posted online, it cannot be
completely removed.
Answer: No Take Backs
Explanation: The "No Take Backs" concept highlights the permanence of online content.
27. Question: Social media platforms like Facebook allow users to adjust ______ settings to
control who can see their posts.
Answer: privacy
Explanation: Privacy settings help users manage who can view their content.
28. Question: ______ is the act of publicly revealing someone's private information online.
Answer: Doxing
Explanation: Doxing involves sharing personal information without consent.
29. Question: ______ is a form of online harassment that involves sending hurtful messages.
Answer: Cyberbullying
Explanation: Cyberbullying includes sending harmful or threatening messages.
30. Question: ______ is the practice of manipulating someone into sharing sensitive
information.
Answer: Grooming
Explanation: Grooming involves building trust to exploit someone, often for malicious
purposes.
31. Question: The ______ Act 2018 governs how personal data is used in the UK.
Answer: Data Protection
Explanation: The Data Protection Act regulates the handling of personal data.
32. Question: Personal data must be processed ______, lawfully, and transparently.
Answer: fairly
Explanation: Fair processing is a key principle of data protection.
33. Question: Sensitive data such as health information is protected by ______ laws.
Answer: stronger
Explanation: Sensitive data requires enhanced protection under data protection laws.
34. Question: The ______ Regulation (GDPR) is a comprehensive data protection law in the EU.
Answer: General Data Protection
Explanation: GDPR sets strict rules for data protection and privacy.
35. Question: Data ______ ensures that information is accessible when needed.
Answer: availability
Explanation: Availability ensures that data is accessible to authorized users.
Network Security
36. Question: A ______ firewall monitors and controls incoming and outgoing network traffic.
Answer: network
Explanation: Firewalls protect networks by filtering traffic.
37. Question: ______ is a protocol that encrypts data transmitted over the internet.
Answer: IPsec
Explanation: IPsec provides secure communication over IP networks.
38. Question: A ______ attack involves redirecting users to fake websites to steal information.
Answer: pharming
Explanation: Pharming redirects users to malicious sites to harvest data.
39. Question: ______ is a protocol that provides secure communication over the internet.
Answer: SSL/TLS
Explanation: SSL/TLS encrypts data to ensure secure communication.
40. Question: A ______ attack exploits weaknesses in network protocols like DNS.
Answer: DoS
Explanation: DoS attacks target network protocols to disrupt services.
42. Question: ______ is a type of malware that spreads through email attachments.
Answer: Worm
Explanation: Worms often spread via email attachments or network shares.
43. Question: A ______ virus embeds itself in the boot sector of a computer.
Answer: boot sector
Explanation: Boot sector viruses infect the boot sector of a hard drive.
45. Question: A ______ virus hijacks web browser functions and redirects users to malicious
sites.
Answer: browser hijacker
Explanation: Browser hijackers alter browser settings to redirect users.
Ethical Decision-Making
48. Question: Promoting ______ in IT practices helps build trust with users.
Answer: integrity
Explanation: Integrity ensures that IT systems are reliable and trustworthy.
51. Question: ______ scams promise unrealistic returns to entice victims to invest money.
Answer: Investment
Explanation: Investment scams lure victims with promises of high returns.
52. Question: ______ is the fraudulent practice of sending emails to trick recipients into
revealing personal information.
Answer: Phishing
Explanation: Phishing emails often impersonate legitimate organizations.
53. Question: ______ is the act of redirecting users to fake websites to steal information.
Answer: Pharming
Explanation: Pharming involves redirecting users to malicious sites.
54. Question: ______ is the unauthorized access to data stored in a system or online account.
Answer: Hacking
Explanation: Hacking involves gaining unauthorized access to systems or data.
55. Question: ______ is the practice of using someone else's identity for fraudulent purposes.
Answer: Identity theft
Explanation: Identity theft involves stealing personal information to commit fraud.
56. Question: Parental controls can block or filter ______ content for children.
Answer: inappropriate
Explanation: Parental controls help restrict access to unsuitable content.
57. Question: ______ settings on devices can limit screen time for children.
Answer: Time-out
Explanation: Time-out settings restrict device usage after a certain period.
58. Question: Parental controls can prevent children from accessing ______ websites.
Answer: harmful
Explanation: Parental controls block access to harmful or inappropriate sites.
59. Question: ______ controls can restrict app purchases on children's devices.
Answer: Parental
Explanation: Parental controls can prevent unauthorized app purchases.
60. Question: ______ settings on social media platforms can limit who can contact children.
Answer: Privacy
Explanation: Privacy settings help control who can interact with children online.
61. Question: ______ encryption scrambles data so that only authorized users can read it.
Answer: Data
Explanation: Data encryption protects information from unauthorized access.
62. Question: ______ is a method of encrypting files and folders on NTFS partitions.
Answer: EFS
Explanation: EFS (Encrypting File System) provides file-level encryption.
63. Question: ______ encryption protects data stored on entire disk drives.
Answer: Disk
Explanation: Disk encryption secures all data on a storage device.
64. Question: ______ is a technique that hides data within other files, such as images or audio.
Answer: Steganography
Explanation: Steganography conceals data within other files to avoid detection.
65. Question: ______ encryption uses public and private keys to secure data.
Answer: Asymmetric
Explanation: Asymmetric encryption uses a pair of keys for secure communication.
66. Question: The ______ protocol translates human-readable hostnames into IP addresses.
Answer: DNS
Explanation: DNS (Domain Name System) resolves domain names to IP addresses.
67. Question: ______ is a protocol that provides reliable, ordered delivery of data packets.
Answer: TCP
Explanation: TCP (Transmission Control Protocol) ensures reliable data transmission.
69. Question: ______ is a protocol that provides secure communication over HTTP.
Answer: HTTPS
Explanation: HTTPS (Hypertext Transfer Protocol Secure) encrypts web traffic.
70. Question: ______ is a protocol that provides end-to-end security for email communication.
Answer: SSL/TLS
Explanation: SSL/TLS (Secure Sockets Layer/Transport Layer Security) secures email
communication.
71. Question: The ______ Act 1990 criminalizes unauthorized access to computer systems.
Answer: Computer Misuse
Explanation: The Computer Misuse Act addresses hacking and unauthorized access.
72. Question: The ______ Act 2010 prohibits discrimination based on protected characteristics.
Answer: Equality
Explanation: The Equality Act protects against discrimination in various contexts.
73. Question: The ______ Act 1988 criminalizes sending offensive or threatening
communications.
Answer: Malicious Communications
Explanation: The Malicious Communications Act addresses harmful online behavior.
74. Question: The ______ Act 1997 protects individuals from repeated harassment.
Answer: Protection from Harassment
Explanation: The Protection from Harassment Act addresses stalking and harassment.
75. Question: The ______ Act 2003 regulates electronic communications and online behavior.
Answer: Communications
Explanation: The Communications Act governs electronic communications in the UK.
77. Question: Backing up data to an ______ location protects against physical damage.
Answer: offsite
Explanation: Offsite backups protect data from local disasters like fires.
78. Question: ______ is the process of creating copies of data for recovery purposes.
Answer: Backup
Explanation: Backups are essential for data recovery in case of failure.
79. Question: ______ backups can be scheduled to run automatically at regular intervals.
Answer: Automated
Explanation: Automated backups ensure data is regularly saved without manual
intervention.
80. Question: Backing up data to ______ storage services provides remote access to files.
Answer: online
Explanation: Online backups allow access to data from any location.
81. Question: ______ engineering exploits human psychology to manipulate individuals into
revealing sensitive information.
Answer: Social
Explanation: Social engineering relies on psychological manipulation.
82. Question: ______ is a common phishing tactic where attackers impersonate trusted entities.
Answer: Spoofing
Explanation: Spoofing involves faking the identity of a trusted source.
83. Question: ______ emails often create a sense of urgency to trick recipients into taking
action.
Answer: Phishing
Explanation: Phishing emails use urgency to pressure victims into responding.
84. Question: ______ is a phishing technique that uses misspelled URLs to deceive users.
Answer: Typosquatting
Explanation: Typosquatting relies on common misspellings of legitimate URLs.
85. Question: ______ is a phishing method that uses fake websites to steal login credentials.
Answer: Spoofing
Explanation: Spoofing involves creating fake websites that mimic legitimate ones.
Hardware Security
86. Question: ______ Trojans are malicious modifications made to electronic devices.
Answer: Hardware
Explanation: Hardware Trojans are malicious alterations to hardware components.
87. Question: ______ attacks exploit physical information like power consumption to leak
sensitive data.
Answer: Side-channel
Explanation: Side-channel attacks analyze physical characteristics to extract data.
88. Question: ______ hardware devices are designed to resist tampering and unauthorized
access.
Answer: Tamper-resistant
Explanation: Tamper-resistant hardware prevents physical tampering.
89. Question: ______ is a technique used to conceal the functionality of electronic hardware.
Answer: Obfuscation
Explanation: Obfuscation hides the true purpose of hardware components.
Software Vulnerabilities
91. Question: ______ overflow occurs when a program tries to store more data in a buffer than
it can hold.
Answer: Buffer
Explanation: Buffer overflow exploits can corrupt adjacent memory.
92. Question: ______ injection is a common attack that exploits vulnerabilities in web
applications.
Answer: SQL
Explanation: SQL injection targets databases through malicious queries.
93. Question: ______ conditions occur when the output of a process depends on the timing of
events.
Answer: Race
Explanation: Race conditions can lead to unpredictable behavior in software.
94. Question: ______ validation ensures that input data follows specific rules.
Answer: Input
Explanation: Input validation prevents