Page 1043 - SUBSEC October 2017_Neat
P. 1043
- 5 -
27. You received an email from someone who 31. Which of the following is a job task of a
claims to be a representative from your social media specialist?
school. The email asked you to click on a
link to reset your password. You should (A) Maintaining a website
proceed with caution because the email (B) Developing software for social
may be a use
(C) Installing or upgrading social
(A) spam threat media software on a computer
(B) malware attack system
(C) phishing attack (D) Generating and sharing content
(D) legitimate request daily over a social media network
28. Using electronic devices to view a chat 32. Which of the following are physical
conversation between two friends, in real restrictions with respect to data security?
time, without their knowledge is
I. Firewall
(A) propaganda II. Locking up the hardware
(B) a violation of privacy III. Biometric systems
(C) a denial of service attack
(D) an electronic eavesdropping (A) I and II only
(B) I and III only
(C) II and III only
29. The use of “*********” to hide a password (D) I, II and III
being entered into a computer system is
termed
33. Which of the following actions is NOT
(A) antivirus considered a computer crime?
(B) phishing
(C) biometrics (A) Piracy
(D) encryption (B) Hacking
(C) Encryption
(D) Industrial espionage
30. In an effort to secure data on a system, users
are required to set a password in a specific
format. Which of the following types of 34. Including material obtained from online
measures is this an example of? sources in an assignment and then
submitting the assignment without giving
(A) Physical credit to the online sources is referred to as
(B) Software
(C) Hardware (A) plagiarism
(D) Personal (B) e-learning
(C) fraternization
(D) collaboration
GO ON TO THE NEXT PAGE
01229010/CSEC/SPEC/2017