0% found this document useful (0 votes)
192 views5 pages

Safety and Security Exam

Uploaded by

stanbokee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
192 views5 pages

Safety and Security Exam

Uploaded by

stanbokee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SAFETY AND SECURITY EXAM

---

1. Name three safety issues when using computer systems.

a. Three safety issues:


1. Tripping over loose wires.
2. Heavy equipment falling off tables and injuring people.
3. Overloading sockets causing a fire.

b. For each named safety issue, describe one way to remove or mitigate against the risk:
1. Loose wires: Use cable organizers or secure cables to avoid tripping hazards.
2. Falling equipment: Place heavy equipment on stable surfaces and avoid overcrowding tables.
3. Overloaded sockets: Avoid plugging too many devices into one outlet; use power strips with surge
protectors.

---

2. Internet banking can be used by bank customers to check their account


balance. Many ways of logging into such a system involve the use of passwords.
Describe three methods of minimising the possibility of passwords being
misused or intercepted.

1. Use strong, unique passwords.


2. Enable two-factor authentication (2FA).
3. Regularly update passwords and avoid reusing old ones.

---

3. There are a number of health and safety issues associated with the use of
computers. Draw arrows from the terms Health or Safety to the matching issue.
Use a maximum of four arrows.

- Health: Clicking a mouse repetitively causing RSI (Repetitive Strain Injury).


- Safety: Tripping over loose wires.
- Health: Heavy equipment falling off tables and injuring people.
- Safety: Overloading sockets causing a fire.

---


SAFETY AND SECURITY EXAM
4. Discuss the e-safety issues when using a social networking site.

a. E-safety issues:
1. Privacy concerns, such as sharing personal information publicly.
2. Cyberbullying from other users.
3. Phishing attacks to steal sensitive information.

b. Data can be classified as personal or sensitive. Give two examples of each.


- Personal data: Name, date of birth.
- Sensitive data: Ethnic origin, political views.

---

5. Indicate, by ticking (✓) the appropriate box, which of the following are
examples of a health risk and which are examples of a safety risk.

1. Tripping over a loose wire on the floor → Safety


2. Headaches caused by the glare from a computer screen → Health
3. Risk of electrocution caused from damaged insulation on an electric cable → Safety
4. Broken leg injury caused by falling equipment → Safety
5. Irritation of the eyes caused by ozone gas from a laser printer → Health
6. Repetitive strain injury (RSI) from repeated use of a keyboard → Health
7. Neck strain from sitting in a prolonged position in front of a monitor → Health

---

6. Seven ICT descriptions are shown on the left and seven ICT terms on the right.
By drawing arrows, connect each description to the correct term.

1. Authentication method using, for example, fingerprint scans, retina scans, or face
recognition → Biometrics
2. Result of putting a message through an encryption algorithm → Ciphertext
3. Electronic document that uses a public key and a private key to secure data sent over
the internet → Digital certificates
4. Hardware or software that sits between a computer and an external network that filters
traffic in and out → Firewall
5. Protocol that allows data to be sent and received securely over the internet → Secure
sockets layer (SSL)
6. Program code that copies itself with the intention of deleting or corrupting files on a
computer → Virus
7. Malicious code that redirects a web browser to a fake website → Pharming

---
SAFETY AND SECURITY EXAM
7. Complete the following paragraph using words or phrases from the list.

1. e-safety refers to safety when using the internet.


2. Sensitive data, such as ethnic origin or political views, are examples of personal data.
3. When using online social networks, it is important to maintain privacy settings to control who
has access to your profile.
4. Users have to be aware of hacking, which is illegal access to their computer, or phishing,
which occurs when legitimate-looking emails are received.
5. In this security threat, as soon as the link is clicked on, the user’s browser is sent to a fake
website.
6. This is similar to pharming, where text messages are sent out from a fake company.
7. To prevent intercepted data being understood by a hacker, it is encrypted.
8. Protocols called secure sockets layer (SSL) are used on the internet to allow data to be sent
and received securely.
9. They are often used with digital certificates, which are electronic documents confirming the
authenticity of the sender of the data.

---

8. Explain what is meant by a firewall.

a. What is meant by a firewall?


A firewall is hardware or software that acts as a barrier between a private internal network and
external networks, controlling and monitoring traffic based on security rules.

b. Describe four of the tasks carried out by a typical firewall:


1. Prevent unauthorized access to the network.
2. Filter and monitor traffic for malicious activities.
3. Block malware from entering the system.
4. Log network activity for security analysis.

---

9. Explain each of the following terms and give an example of their use.

a. Cloning of credit cards:


Illegally copying a card’s magnetic strip to make fraudulent purchases.
Example: Using a skimmer at an ATM.

b. Fingerprint scanning:
Biometric method to verify identity using fingerprints.
Example: Smartphone unlocking.
SAFETY AND SECURITY EXAM
c. Digital certificates:
Used to authenticate the identity of websites or users.
Example: SSL certificates for secure websites.

d. Encryption:
Converting data into unreadable form to secure it.
Example: Secure email communication.

e. Vishing:
Phishing through voice calls to steal sensitive information.
Example: Scammers pretending to be bank representatives.

---

10. Name three biometric authentication techniques.

a. Three techniques:
1. Fingerprint scanning.
2. Face recognition.
3. Retina scanning.

b. For each named technique, describe the advantages and disadvantages:


1. Fingerprint scanning:
- Advantage: Fast and reliable.
- Disadvantage: May not work with damaged fingers.

2. Face recognition:
- Advantage: Contactless and convenient.
- Disadvantage: Affected by poor lighting or facial changes.

3. Retina scanning:
- Advantage: Very secure.
- Disadvantage: Expensive and invasive.

---

11. Explain authentication and two-factor authentication.

a. What is authentication?
The process of verifying a user’s identity to grant system access.

b. What is two-factor authentication?


A method requiring two identification factors, such as a password and a verification code.
SAFETY AND SECURITY EXAM
---

12. Encryption and Keylogging Threats

a. Why is it important to encrypt emails?


Encrypting emails protects sensitive data from being intercepted during transmission.

b. Explain why keylogging software poses a security threat when purchasing items on
the internet.
Keylogging records keystrokes, exposing sensitive data like passwords and payment details
during online purchases.

You might also like