Welcome to your Grade 9 Infrormation Technology chapter 5
After carefully reading the following 30 questions, choose the correct answer.
1.
What is the state of being free from danger or threat?
2.
Which computer security principle ensures that only authorized users can access information?
3.
What does 'Integrity' in computer security mean?
4.
Which principle ensures that a system is accessible and usable when needed by authorized users?
5.
What is a potential cause of an unwanted incident that may result in harm to a system?
6.
Which of the following is an example of a software-based security threat?
7.
What is a 'Vulnerability' in the context of computer security?
8.
What is the main goal of a 'Denial of Service' (DoS) attack?
9.
Which security measure involves creating a copy of data to be used if the original is lost?
10.
What is 'Social Engineering'?
11.
Which term describes a program that appears harmless but performs malicious actions?
13.
Which security tool monitors and controls incoming and outgoing network traffic?
14.
What is the purpose of 'Encryption'?
15.
Which of these is a good practice for password security?
17.
What can be a potential loss due to a security attack?
18.
Which malware spreads itself automatically over a network?
19.
What is the purpose of 'Antivirus' software?
20.
What is a 'Digital Footprint'?
21.
Which of the following is NOT a principle of computer security?
22.
What should you do if you suspect your computer has a virus?
23.
Which term describes the unauthorized access to data?
25.
What is the best way to secure your personal files?
26.
What does 'CIA' stand for in computer security?
27.
What is 'Cyberbullying'?
28.
Which practice helps in creating a positive digital footprint?
29.
What is 'Identity Theft'?
30.
What is the first line of defense against unauthorized access to a computer?