“200”, Aptitude Test
Questions and Answers for ICT Officer II (Security) – Tanzania Ports Authority
(TPA).
ABSTRACT
This document contains 200 multiple-choice
questions for ICT Officer II (Security) exam preparation in Tanzania. Questions
cover CCTV, access control, network security, hardware/software maintenance,
and cybersecurity. Each question includes four answer choices, the correct answer,
and a rationale, designed to build understanding, critical thinking, and exam
readiness.
Prepared by:
ICT Officer and compiled by
Johnson Yesaya Mgelwa.
A lawyer stationed in Dar-es-salaam.
0628729934.
Date: June 16, 2025
Dear applicants,
This collection of questions and answers
has been carefully prepared to help all of you to understand the key areas
tested during the interview. The goal is to provide a useful, and practical
study guide so you can all perform confidently and fairly in the selection
process. I wish you the best of luck, and may this resource support you in
achieving success!
Warm regards,
Johnson Yesaya Mgelwa
For Personal Use by Applicants Preparing
for ICT Officer II (Security) – Tanzania Ports Authority (TPA).
ALL QUESTIONS ARE COMPILED TOGETHER.
1. Which protocol is commonly used to secure remote login and command execution in network devices?
A. FTP B. SSH C. Telnet D. SNMP
Answer: B
Rationale: SSH (Secure Shell) is the
industry-standard protocol for secure remote login, command execution, and file
transfer, providing encryption and integrity. Unlike Telnet, which transmits
data in plain text, SSH ensures secure communications, which is critical for
ICT security operations.
2. In CCTV systems, which component is responsible for storing large volumes of video footage for later retrieval?
A. Router B. NVR C. Access Point D. Firewall
Answer: B
Rationale: An NVR (Network Video Recorder) is
specifically designed to store and manage large volumes of CCTV footage. Unlike
routers or firewalls that manage network traffic, the NVR records, archives,
and provides access to surveillance videos, making it essential in security
system infrastructure.
3. The process of ensuring
that CCTV footage is available even after accidental deletion is best achieved
through:
A. Software patching B. Cloud backups C. Antivirus scans D. Bandwidth
optimization
Answer: B
Rationale: Cloud backups ensure redundancy and
resilience of CCTV footage, protecting it from accidental deletion, corruption,
or system failure. While antivirus and bandwidth optimization are important for
security, they do not provide data recovery. Regular cloud or external backup
strategies are vital for ICT Officer II roles.
4. Which security principle
ensures that only authorized staff can access specific ICT systems or
facilities?
A. Confidentiality B. Integrity C. Availability D. Authentication
Answer: A
Rationale: Confidentiality in information security
refers to restricting access to authorized users only. This principle is
directly applied in access control systems, ID card registrations, and
surveillance management, ensuring sensitive data and facilities are not exposed
to unauthorized individuals.
5. Which type of cable is most
recommended for connecting IP CCTV cameras to the network infrastructure?
A. HDMI B. Coaxial C. Ethernet Cat6 D. USB
Answer: C
Rationale: Ethernet Cat6 cables are the standard for
IP CCTV networks because they provide high-speed data transfer, reduced
interference, and long-distance connectivity compared to coaxial or USB cables.
This makes Cat6 the most suitable option for modern CCTV system installations.
6. In designing a CCTV
placement strategy, which factor should be prioritized most?
A. Camera resolution B. Coverage of blind spots C. Cable length D. Storage
capacity
Answer: B
Rationale: Effective CCTV design focuses on
eliminating blind spots to ensure maximum coverage. While resolution, cable
length, and storage are important, cameras that leave blind spots compromise
security. An ICT Officer must prioritize strategic placement over other
factors.
7. Which access control
technology relies on radio frequency to identify and authenticate individuals?
A. PIN codes B. Biometric scanners C. Magnetic stripes D. RFID cards
Answer: D
Rationale: RFID (Radio Frequency Identification)
cards use radio signals to communicate with readers, allowing secure and
contactless access control. This technology is widely adopted in modern
organizations for registering staff ID cards.
8. When troubleshooting CCTV
software that fails to load footage, the FIRST step should be to:
A. Replace the cameras B. Restart the NVR service C. Check the power supply D.
Update the operating system
Answer: C
Rationale: Power supply issues are the most common
cause of CCTV system malfunctions. Before attempting complex troubleshooting
like system updates or hardware replacements, the ICT Officer should always
check basic functionality such as power and connectivity.
9. Which of the following best
describes a Public Address (PA) system?
A. A system for encrypting communication B. A system for broadcasting
announcements C. A system for recording audio logs D. A system for archiving
CCTV footage
Answer: B
Rationale: A PA system is designed to broadcast
announcements, alerts, or emergency notifications to large groups of people. It
plays a vital role in organizational communication and security alert systems,
separate from CCTV or archival functions.
10. In ICT security, the
“least privilege principle” means:
A. Users get unlimited access to all systems. B. Users are denied access to all
resources. C. Users are given only necessary access rights. D. Users are given
temporary administrator roles.
Answer: C
Rationale: The least privilege principle ensures
that users are granted only the access necessary to perform their duties. This
reduces the risk of insider threats and accidental damage, making it a core
security practice in ICT roles.
11. What is the primary
purpose of a firewall in ICT security infrastructure?
A. To store data B. To block unauthorized access C. To power network devices D.
To monitor CCTV cameras
Answer: B
Rationale: Firewalls are security devices/software
that block unauthorized network access while allowing legitimate traffic. They
protect against external attacks, malware, and intrusions, ensuring the
security of ICT systems.
12. Which RAID level provides
both improved performance and redundancy in CCTV storage servers?
A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 6
Answer: C
Rationale: RAID 5 uses striping with parity,
offering a balance between performance and redundancy. This makes it suitable
for CCTV servers where both reliability and efficient storage are critical.
RAID 0 provides no redundancy, while RAID 1 and RAID 6 offer less storage
efficiency.
13. In ICT terms, PIDS stands
for:
A. Public Internet Data Security B. Perimeter Intrusion Detection System C.
Personal Identification Security D. Private Identity Database System
Answer: B
Rationale: PIDS (Perimeter Intrusion Detection
System) is a physical security system designed to detect unauthorized entry at
the perimeter of a facility. It complements CCTV and access controls in
safeguarding premises.
14. Which of the following is
a strong authentication method for ICT systems?
A. Single password B. Username only C. Multi-factor authentication D. Shared
login credentials
Answer: C
Rationale: Multi-factor authentication (MFA)
strengthens system security by requiring at least two verification methods
(e.g., password + biometric/OTP). This reduces the risk of compromised accounts
compared to single-password systems.
15. When installing radio
infrastructure for security communication, which frequency band is most
commonly used?
A. UHF B. Infrared C. Microwave D. NFC
Answer: A
Rationale: UHF (Ultra High Frequency) bands are
widely used in two-way radios for security and surveillance communication
because they provide a good balance between range and clarity, unlike infrared
or NFC which have limited communication capabilities.
16. Which of the following is
an example of a preventive control in ICT security?
A. CCTV recording B. User awareness training C. Incident response D. Audit logs
Answer: B
Rationale: Preventive controls aim to stop incidents
before they occur. User awareness training helps prevent phishing, social
engineering, and insider errors. CCTV, incident response, and logs are more
detective or corrective rather than preventive.
17. Which cryptographic method
is MOST suitable for securing CCTV footage archives?
A. Symmetric encryption B. Hashing only C. Plain storage D. Open sharing
Answer: A
Rationale: Symmetric encryption, such as AES,
ensures CCTV footage is securely stored and retrievable only by authorized
users. Hashing alone cannot decrypt data, while plain storage and open sharing
expose footage to unauthorized access.
18. The MOST critical factor
in ensuring high availability of network infrastructure is:
A. Redundant systems B. Longer cables C. Increased staff D. Faster processors
Answer: A
Rationale: High availability requires redundancy,
including backup servers, power supplies, and failover systems. This minimizes
downtime, ensuring surveillance and security systems remain operational even
during failures.
19. Which layer of the OSI
model is responsible for encryption and decryption of data?
A. Network B. Transport C. Session D. Presentation
Answer: D
Rationale: The presentation layer of the OSI model
handles encryption, decryption, and translation of data formats, ensuring
secure and accurate data transmission between devices.
20. When planning CCTV
investigation strategy, which factor is most critical?
A. Time synchronization of cameras B. Monitor size C. Lighting system D. Cable
brand
Answer: A
Rationale: Time synchronization across all CCTV
cameras ensures evidence consistency during investigations. Without accurate
timestamps, footage may not hold up in legal proceedings. Other factors matter
but are secondary to synchronization.
21. Which tool is commonly
used to test and identify network problems?
A. Wireshark B. Adobe Reader C. VLC Media Player D. Photoshop
Answer: A
Rationale: Wireshark is a network protocol analyzer
that captures and analyzes network traffic, helping ICT officers identify
connectivity and performance problems. The other tools serve unrelated
multimedia purposes.
22. Which wireless security
protocol is the MOST secure for CCTV network communication?
A. WEP B. WPA2 C. WPA D. Open Wi-Fi
Answer: B
Rationale: WPA2 uses AES encryption, providing
strong security for wireless communications. WEP and WPA have vulnerabilities,
while open Wi-Fi provides no security, making WPA2 the best option for
sensitive CCTV communications.
23. Which ICT standard best
describes guidelines for information security management systems?
A. ISO 9001 B. ISO 27001 C. ISO 14001 D. ISO 22000
Answer: B
Rationale: ISO 27001 defines best practices for
establishing, implementing, and maintaining an Information Security Management
System (ISMS). It is crucial for ICT officers managing security infrastructure.
24. What is the primary
purpose of biometric access control systems?
A. To reduce hardware costs B. To store personal data C. To authenticate users
using unique traits D. To replace all CCTV systems
Answer: C
Rationale: Biometric systems authenticate users by
unique biological traits like fingerprints or iris scans, enhancing access
control security. They are not meant to replace CCTV or reduce costs but to
strengthen identity verification.
25. Which network topology
provides the highest reliability for security system infrastructure?
A. Bus B. Ring C. Star D. Mesh
Answer: D
Rationale: Mesh topology offers high reliability
since every node is connected to multiple nodes, providing redundancy. If one
link fails, data still travels via alternative paths, ensuring continuous
operation of critical security systems.
26. Which of the following is
MOST effective for preventing unauthorized physical access to a server room?
A. Strong password B. CCTV cameras C. Biometric locks D. Antivirus software
Answer: C
Rationale: Biometric locks provide direct physical
access control using unique human traits such as fingerprints or iris
recognition. While CCTV monitors and passwords support security, only biometric
systems effectively prevent unauthorized entry into server rooms.
27. Which wireless frequency
band provides longer range but lower bandwidth in security networks?
A. 2.4 GHz B. 5 GHz C. 60 GHz D. 900 MHz
Answer: A
Rationale: The 2.4 GHz band penetrates walls and
covers larger distances but offers lower speeds compared to the 5 GHz band. In
security systems like CCTV, range often matters more than very high speed,
making 2.4 GHz suitable in many cases.
28. The process of analyzing
CCTV footage frame by frame to identify crime evidence is called:
A. Forensic video analysis B. Packet sniffing C. Load balancing D. Image
hashing
Answer: A
Rationale: Forensic video analysis is the detailed
examination of CCTV footage to extract, enhance, and validate crime-related
evidence. This differs from packet sniffing (network), load balancing (network
distribution), and image hashing (data integrity).
29. In intrusion detection
systems, a “false positive” refers to:
A. An attack that is undetected B. A legitimate action flagged as an attack C.
An attacker bypassing the firewall D. An ignored alarm
Answer: B
Rationale: A false positive occurs when legitimate
activity is incorrectly flagged as malicious by an intrusion detection system.
While it does not indicate real compromise, it creates noise and wastes time
during investigations.
30. Which CCTV camera type can
rotate horizontally and vertically for wider coverage?
A. Dome camera B. Bullet camera C. Fixed box camera D. PTZ camera
Answer: D
Rationale: PTZ (Pan-Tilt-Zoom) cameras can rotate
horizontally, tilt vertically, and zoom in/out, offering flexible surveillance
coverage. Dome and bullet cameras are fixed and cannot provide dynamic
monitoring.
📘 Get the Full Aptitude Test Questions PDF through your Gmail (Questions 1–200)
You’ve just accessed the first 30 questions. The full set of 200 expertly prepared aptitude test questions for a ICT Officer II (Security) – Tanzania Ports Authority (TPA). Is available, pay, and get access.
To get access to the full PDF, please make a payment of Tsh 10,000 to the LIPA numbers below:
After payment, please send a text message to notify us of your payment:
⚠️ Important Notice
- The PDF will be watermarked with your name and phone number and protected for personal use only.
- Redistribution, sharing, screenshotting, or copying the contents is strictly prohibited. When you share unlawfully, your name and phone number are visible and easy to trace as you leaked a document to other third parties.
- Legal action may be taken against the misuse of this material.
Thank you for supporting quality content. Best of luck in your interview preparation!
0 Comments
PLACE YOUR COMMENT HERE
WARNING: DO NOT USE ABUSIVE LANGUAGE BECAUSE IT IS AGAINST THE LAW.
THE COMMENTS OF OUR READERS IS NOT OUR RESPONSIBILITY.