Page 1043 - SUBSEC October 2017_Neat
P. 1043

-  5  -



             27.    You received an email from someone who     31.    Which of the following is a job task of a
                    claims to be a representative from your           social media specialist?
                    school. The email asked you to click on a
                    link to reset your password. You should           (A)    Maintaining a website
                    proceed with caution because the email            (B)    Developing software for social
                    may be a                                                               use
                                                                      (C)    Installing or upgrading social
                    (A)    spam threat                                          media software on a computer
                    (B)    malware attack                                       system
                    (C)    phishing attack                            (D)    Generating and sharing content
                    (D)    legitimate request                                            daily over a social media network



             28.    Using  electronic  devices  to  view  a  chat   32.   Which  of  the  following  are  physical
                    conversation between two friends, in real         restrictions with respect to data security?
                    time, without their knowledge is
                                                                        I.     Firewall
                    (A)    propaganda                                  II.    Locking up the hardware
                    (B)    a violation of privacy                     III.     Biometric systems
                    (C)    a denial of service attack
                    (D)    an electronic eavesdropping                (A)    I and II only
                                                                      (B)    I and III only
                                                                      (C)    II and III only
             29.    The use of “*********” to hide a password         (D)    I, II and III
                    being entered into a computer system is
                    termed
                                                               33.    Which of the following actions is NOT
                    (A)    antivirus                                  considered a computer crime?
                    (B)    phishing
                    (C)    biometrics                                 (A)    Piracy
                    (D)    encryption                                 (B)    Hacking
                                                                      (C)    Encryption
                                                                      (D)    Industrial espionage
             30.    In an effort to secure data on a system, users
                    are required to set a password in a specific
                    format. Which of the following types of    34.    Including material obtained from online
                    measures is this an example of?                   sources in an assignment and then
                                                                      submitting the assignment without giving
                    (A)    Physical                                   credit to the online sources is referred to as
                    (B)    Software
                    (C)    Hardware                                   (A)    plagiarism
                    (D)    Personal                                   (B)    e-learning
                                                                      (C)    fraternization
                                                                      (D)    collaboration










                                                                           GO  ON  TO  THE  NEXT  PAGE
             01229010/CSEC/SPEC/2017
   1038   1039   1040   1041   1042   1043   1044   1045   1046   1047   1048