0% found this document useful (0 votes)
90 views4 pages

Kalinga National High School: S V S V S - V V V S S S V S S V S

This document provides an answer key for a quarterly exam on computer and network security. It includes multiple choice questions about security concepts like threats, attacks, and maintenance plans. The key also differentiates between physical and data security attacks and identifies common types of malware like viruses, worms, and Trojan horses.

Uploaded by

Hydralyn Palchan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views4 pages

Kalinga National High School: S V S V S - V V V S S S V S S V S

This document provides an answer key for a quarterly exam on computer and network security. It includes multiple choice questions about security concepts like threats, attacks, and maintenance plans. The key also differentiates between physical and data security attacks and identifies common types of malware like viruses, worms, and Trojan horses.

Uploaded by

Hydralyn Palchan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

KALINGA NATIONAL HIGH SCHOOL

Bulanao, Tabuk City, Kalinga


Grade X – ICT(Specialization)
4TH Quarter Examination
ANSWER KEY

I. MODIFIED TRUE OR FALSE: Write SECURITY if the statement makes it true and VIRUS
if it is makes the statement a false.
1. Computer and network security help keep data and equipment safe by giving limited
access to appropriate people. S
2. Damage or loss of equipment doesn’t affect the productivity of the network. V
3. Theft, loss, network intrusion, and physical damage are some of the ways a network or
computer can be harmed. S
4. Repairing and replacing equipment can save the company time and money. V
5. Unauthorized use of a network can expose confidential information and reduce network
resources. S
6. Threats to security can come only outside an organization, and the level of potential
damage can vary greatly. V
7. Malicious threats are when the user damages data or equipment unintentionally. V
8. Threats against data are never changing as attackers find new ways to gain entry and
commit their crimes. V
9. A virus is transferred to another computer through e-mail, file transfers, and instant
messaging. S
10. A firewall is a way of protecting a computer from intrusion through the ports. S
11. A network has multiple layers of security, including physical, wireless, and data. S
12. Virus protection software can help prevent attackers from monitoring or recording traffic
between resources and computers. V
13. Threats to security can come from inside and outside the organization. S
14. Computer and network security help keep data and equipment safe. S
15. A technician’s secondary responsibilities include data and network security. V
16. Preventive maintenance can be described as maintenance of equipment or systems
before fault occurs. S
17. Condition Based Maintenance is a scheduled service visit carried out by a competent and
suitable agent, to ensure that an item of equipment is operating correctly to avoid any
unscheduled breakdown and downtime of an equipment. V
18. Planned Maintenance dictates that maintenance should only be performed when certain
indicators show decreasing performance or upcoming failure. V
19. In preparing maintenance procedure, you also have to consider designing a systematic
plan for hardware. V
20. This saves time, money and frustration and ensures safe conditions to prevent injury to
people and damage to computer equipment. S
21. A systematic maintenance plan for hardware includes moving the computer only when it is
turned off and unplugged. S
22. A systematic maintenance plan for hardware includes placing your computer in a well-
ventilated area. S
23. A systematic maintenance plan for hardware includes designing a monitoring, evaluating
and updating plan. S
24. A systematic maintenance plan for hardware includes backup your files. V
25. A systematic maintenance plan for hardware includes scheduling the use of computer for its
longer life. V
26. A systematic maintenance plan for software includes Installing or securing passwords. S
27. A systematic maintenance plan for software includes treating your computer properly. V
28. A systematic maintenance plan for software deleting temporary files. S
29. A systematic maintenance plan for software Updating anti-virus and spyware. S
30. Installing passwords makes your files more vulnerable into data hacking. V
31. Place your computer in a well-ventilated area. S
32. Schedule the use of computer for its longer life. S
33. You can move the computer even if it is turned off and plugged. V
34. PCs and laptops should be properly turned off. S
35. Do systematic maintenance plan for your computer software. S
36. Back-up your files. S
37. Regularly update your anti-virus for your computer protection against viruses. S
38. Deleting the temporary files on your computer will enhance its speed and will create more
disk space for your files. S
39. Install or secure passwords. S
40. Back-up your files when it is needed. V
41. A fatal error results in data loss, damage to your computer and/or its ability to function,
hardware failure, or other serious issues. S
42. Preventing failure means making sure your computer is physically clean in its operations. S
43. Dust can reduce performance and cause overheating. S
44. It’s okay not to know your computer's specifications and its limits. V
45. RAM runs even the PC is running idly. S
46. Make sure that your anti-virus software is updated to be able to scan unnecessary files that
enter your PC. S
47. You can install programs that you’re not familiar with or if do not fully trust. V
48. When something is not working properly, either diagnose the problem yourself and fix it, to
prevent further damage or contact a professional and have them look at it for you. S
49. Take advantage of warranties on parts if they fail. S
50. If the same error message shows up every time you log in, be sure to investigate it. Although
unlikely, these errors could be important. S
51. Give your computer a break. S
52. It’s okay not to get a warranty to protect your hardware, so it can be replaced in case of
failure. V
53. Run regular backup of your important files to other disks, computers, or an online backup
service. S
54. If your PC fails to function, diagnose the problem. S
55. If you know how to fix it, do it, to avoid further damage but if not then seek for professional
help. S
56. Unplugged or loose network cables are one of the most common reasons why you might
suddenly find yourself unable to connect to the Internet. S
57. Ensure your wired or wireless network hardware is switched off and plugged in. V
58. Before assuming your Internet connection is faulty, try visiting several popular Web sites
rather than just one. S
59. If your computer and another on the network both have different IP address, the conflict
between them will prevent either from working properly online. V
60. If your network uses static IP addresses, automatically change your IP to a different number.
V
61. If you have recently installed or upgraded software firewalls on your computer, temporarily
disable them to determine whether it may be the cause of Internet connection problems. S
62. Whenever you are unable to reach the access point, you also cannot connect to the Internet,
obviously. S
63. Firewall hardware running on most computers is intended to prevent unwanted network
traffic from disrupting its operation. V
64. The nearer a Wi-Fi device is, the slower the local connection generally runs, until it breaks
altogether. V
65. Wi-Fi networks with encryption options like WPA or WEP turned on require computers to
use matching security keys when connecting. S
66. Internet Service Providers (ISPs) can choose to block access from your account if you fail to
make payment or otherwise violate the provider's Terms of Service . S
67. Failures in the operating system software that control the adapter, on the other hand, can
seldom occur especially with computers that are heavily used. V
68. Linux is an open source free operating system which is not widely used by schools at
present, though it may be suitable for schools who are aware of its capabilities. S
69. Ubuntu is still the most common and recommended OS found in schools that meets their
general needs very well and is recommended for schools. V
70. The processor is the brain and heart of the computer. S

II. SECURITY ATTACKS


A. Write P if the statements/events belongs to Physical attacks otherwise D if it is data
attacks.
D1. Denial-of-service(DoS) and distributed denial-of-service (DDoS) attacks
overwhelms a system’s resources so that it cannot respond to service request
D2. Man-in-the-middle (MitM) attacks occur when a hacker inserts itself between
communications of the client and server.
P3. An attacker breaks into a server room and installs rogue devices that capture
confidential dat.
P4. The internet drop line is accessible from outside of the building, allowing an
attacker to intercept data or cut the line completely.
D5. Eavesdropping attacks.
P6. An inside actor looks over the shoulder of a system engineer as they type
administrative credentials into a system.
D7. Password attacks are the most commonly used mechanism to authenticate users
to an information system.
D8. SQL injection attack
D9. Cross- site scripting (XSS) attack
P10. An infected USB drive is planted in a parking lot, lobby, etc., which employee
picks up and loads onto the network.
D11. Phishing and spear phishing attacks is the practice of sending emails.
D12. Drive-by attacks are common method of spreading malware.
D13. Birthday Attack
P14. An attacker pretends to be an employee and counts on real employee’s
courtesy to hold the door for him as they enter together.
D15. Malware attack.
B. Write V for Virus, W for worms, & TJ for Trojan Horse.

1.Creeper V 9.Witty W 17.Welchia V


2.Elk Cloner V 10.Rootkit TJ 18.Commwarrior-A V
3.ILOVEYOU V 11.Trojan-banker TJ 19.Backdoor TJ
4.Nimda V 12.Trojan-DDoS TJ 20.TROJAN-downloader
5.The storm worm W 13.The Morris worm W TJ
6.Blaster W 14.SQL Slammer W 21.Beagle worm W
7.Code Red W 15.Lovesan W 22.Daprosy worm W
8.Lovebug W 16.Blaster V 23.Exploit TJ
24.Trojan-dropper TJ
25.Slammer v

Prepared by: Approved by:

HYDRALYN A. PALCHAN ZALDY V. SARMIENTO


Subject Teacher TLE Head Teacher

You might also like