Recent Posts

6/recent/ticker-posts

“200”, Aptitude Test Questions and Answers for ICT Officer II (Security) – Tanzania Ports Authority (TPA).

 


“200”, Aptitude Test Questions and Answers for ICT Officer II (Security) – Tanzania Ports Authority (TPA).

 

 

ABSTRACT

This document contains 200 multiple-choice questions for ICT Officer II (Security) exam preparation in Tanzania. Questions cover CCTV, access control, network security, hardware/software maintenance, and cybersecurity. Each question includes four answer choices, the correct answer, and a rationale, designed to build understanding, critical thinking, and exam readiness.

 

Prepared by:

ICT Officer and compiled by

Johnson Yesaya Mgelwa.

A lawyer stationed in Dar-es-salaam.

0628729934.

Date: June 16, 2025

 

Dear applicants,

This collection of questions and answers has been carefully prepared to help all of you to understand the key areas tested during the interview. The goal is to provide a useful, and practical study guide so you can all perform confidently and fairly in the selection process. I wish you the best of luck, and may this resource support you in achieving success!

 

Warm regards,

Johnson Yesaya Mgelwa

 

For Personal Use by Applicants Preparing for ICT Officer II (Security) – Tanzania Ports Authority (TPA).

 

ALL QUESTIONS ARE COMPILED TOGETHER.

1. Which protocol is commonly used to secure remote login and command execution in network devices?

A. FTP B. SSH C. Telnet D. SNMP

Answer: B

Rationale: SSH (Secure Shell) is the industry-standard protocol for secure remote login, command execution, and file transfer, providing encryption and integrity. Unlike Telnet, which transmits data in plain text, SSH ensures secure communications, which is critical for ICT security operations.


2. In CCTV systems, which component is responsible for storing large volumes of video footage for later retrieval?

A. Router B. NVR C. Access Point D. Firewall

Answer: B

Rationale: An NVR (Network Video Recorder) is specifically designed to store and manage large volumes of CCTV footage. Unlike routers or firewalls that manage network traffic, the NVR records, archives, and provides access to surveillance videos, making it essential in security system infrastructure.


3. The process of ensuring that CCTV footage is available even after accidental deletion is best achieved through:

A. Software patching B. Cloud backups C. Antivirus scans D. Bandwidth optimization

Answer: B

Rationale: Cloud backups ensure redundancy and resilience of CCTV footage, protecting it from accidental deletion, corruption, or system failure. While antivirus and bandwidth optimization are important for security, they do not provide data recovery. Regular cloud or external backup strategies are vital for ICT Officer II roles.


4. Which security principle ensures that only authorized staff can access specific ICT systems or facilities?

A. Confidentiality B. Integrity C. Availability D. Authentication

Answer: A

Rationale: Confidentiality in information security refers to restricting access to authorized users only. This principle is directly applied in access control systems, ID card registrations, and surveillance management, ensuring sensitive data and facilities are not exposed to unauthorized individuals.


5. Which type of cable is most recommended for connecting IP CCTV cameras to the network infrastructure?

A. HDMI B. Coaxial C. Ethernet Cat6 D. USB

Answer: C

Rationale: Ethernet Cat6 cables are the standard for IP CCTV networks because they provide high-speed data transfer, reduced interference, and long-distance connectivity compared to coaxial or USB cables. This makes Cat6 the most suitable option for modern CCTV system installations.


6. In designing a CCTV placement strategy, which factor should be prioritized most?

A. Camera resolution B. Coverage of blind spots C. Cable length D. Storage capacity

Answer: B

Rationale: Effective CCTV design focuses on eliminating blind spots to ensure maximum coverage. While resolution, cable length, and storage are important, cameras that leave blind spots compromise security. An ICT Officer must prioritize strategic placement over other factors.


7. Which access control technology relies on radio frequency to identify and authenticate individuals?

A. PIN codes  B. Biometric scanners C. Magnetic stripes D. RFID cards

Answer: D

Rationale: RFID (Radio Frequency Identification) cards use radio signals to communicate with readers, allowing secure and contactless access control. This technology is widely adopted in modern organizations for registering staff ID cards.


8. When troubleshooting CCTV software that fails to load footage, the FIRST step should be to:

A. Replace the cameras B. Restart the NVR service C. Check the power supply D. Update the operating system

Answer: C

Rationale: Power supply issues are the most common cause of CCTV system malfunctions. Before attempting complex troubleshooting like system updates or hardware replacements, the ICT Officer should always check basic functionality such as power and connectivity.


9. Which of the following best describes a Public Address (PA) system?

A. A system for encrypting communication B. A system for broadcasting announcements C. A system for recording audio logs D. A system for archiving CCTV footage

Answer: B

Rationale: A PA system is designed to broadcast announcements, alerts, or emergency notifications to large groups of people. It plays a vital role in organizational communication and security alert systems, separate from CCTV or archival functions.


10. In ICT security, the “least privilege principle” means:

A. Users get unlimited access to all systems. B. Users are denied access to all resources. C. Users are given only necessary access rights. D. Users are given temporary administrator roles.

Answer: C

Rationale: The least privilege principle ensures that users are granted only the access necessary to perform their duties. This reduces the risk of insider threats and accidental damage, making it a core security practice in ICT roles.


11. What is the primary purpose of a firewall in ICT security infrastructure?

A. To store data B. To block unauthorized access C. To power network devices D. To monitor CCTV cameras

Answer: B

Rationale: Firewalls are security devices/software that block unauthorized network access while allowing legitimate traffic. They protect against external attacks, malware, and intrusions, ensuring the security of ICT systems.


12. Which RAID level provides both improved performance and redundancy in CCTV storage servers?

A. RAID 0 B. RAID 1 C. RAID 5 D. RAID 6

Answer: C

Rationale: RAID 5 uses striping with parity, offering a balance between performance and redundancy. This makes it suitable for CCTV servers where both reliability and efficient storage are critical. RAID 0 provides no redundancy, while RAID 1 and RAID 6 offer less storage efficiency.


13. In ICT terms, PIDS stands for:

A. Public Internet Data Security B. Perimeter Intrusion Detection System C. Personal Identification Security D. Private Identity Database System

Answer: B

Rationale: PIDS (Perimeter Intrusion Detection System) is a physical security system designed to detect unauthorized entry at the perimeter of a facility. It complements CCTV and access controls in safeguarding premises.


14. Which of the following is a strong authentication method for ICT systems?

A. Single password B. Username only C. Multi-factor authentication D. Shared login credentials

Answer: C

Rationale: Multi-factor authentication (MFA) strengthens system security by requiring at least two verification methods (e.g., password + biometric/OTP). This reduces the risk of compromised accounts compared to single-password systems.


15. When installing radio infrastructure for security communication, which frequency band is most commonly used?

A. UHF B. Infrared C. Microwave D. NFC

Answer: A

Rationale: UHF (Ultra High Frequency) bands are widely used in two-way radios for security and surveillance communication because they provide a good balance between range and clarity, unlike infrared or NFC which have limited communication capabilities.


16. Which of the following is an example of a preventive control in ICT security?

A. CCTV recording B. User awareness training C. Incident response D. Audit logs

Answer: B

Rationale: Preventive controls aim to stop incidents before they occur. User awareness training helps prevent phishing, social engineering, and insider errors. CCTV, incident response, and logs are more detective or corrective rather than preventive.


17. Which cryptographic method is MOST suitable for securing CCTV footage archives?

A. Symmetric encryption B. Hashing only C. Plain storage D. Open sharing
Answer: A

Rationale: Symmetric encryption, such as AES, ensures CCTV footage is securely stored and retrievable only by authorized users. Hashing alone cannot decrypt data, while plain storage and open sharing expose footage to unauthorized access.


18. The MOST critical factor in ensuring high availability of network infrastructure is:

A. Redundant systems B. Longer cables C. Increased staff D. Faster processors

Answer: A

Rationale: High availability requires redundancy, including backup servers, power supplies, and failover systems. This minimizes downtime, ensuring surveillance and security systems remain operational even during failures.


19. Which layer of the OSI model is responsible for encryption and decryption of data?

A. Network B. Transport C. Session D. Presentation

Answer: D

Rationale: The presentation layer of the OSI model handles encryption, decryption, and translation of data formats, ensuring secure and accurate data transmission between devices.


20. When planning CCTV investigation strategy, which factor is most critical?

A. Time synchronization of cameras B. Monitor size C. Lighting system D. Cable brand

Answer: A

Rationale: Time synchronization across all CCTV cameras ensures evidence consistency during investigations. Without accurate timestamps, footage may not hold up in legal proceedings. Other factors matter but are secondary to synchronization.


21. Which tool is commonly used to test and identify network problems?

A. Wireshark B. Adobe Reader C. VLC Media Player D. Photoshop

Answer: A

Rationale: Wireshark is a network protocol analyzer that captures and analyzes network traffic, helping ICT officers identify connectivity and performance problems. The other tools serve unrelated multimedia purposes.


22. Which wireless security protocol is the MOST secure for CCTV network communication?

A. WEP B. WPA2 C. WPA D. Open Wi-Fi

Answer: B

Rationale: WPA2 uses AES encryption, providing strong security for wireless communications. WEP and WPA have vulnerabilities, while open Wi-Fi provides no security, making WPA2 the best option for sensitive CCTV communications.


23. Which ICT standard best describes guidelines for information security management systems?

A. ISO 9001 B. ISO 27001 C. ISO 14001 D. ISO 22000

Answer: B

Rationale: ISO 27001 defines best practices for establishing, implementing, and maintaining an Information Security Management System (ISMS). It is crucial for ICT officers managing security infrastructure.


24. What is the primary purpose of biometric access control systems?

A. To reduce hardware costs B. To store personal data C. To authenticate users using unique traits D. To replace all CCTV systems

Answer: C

Rationale: Biometric systems authenticate users by unique biological traits like fingerprints or iris scans, enhancing access control security. They are not meant to replace CCTV or reduce costs but to strengthen identity verification.


25. Which network topology provides the highest reliability for security system infrastructure?

A. Bus B. Ring C. Star D. Mesh

Answer: D

Rationale: Mesh topology offers high reliability since every node is connected to multiple nodes, providing redundancy. If one link fails, data still travels via alternative paths, ensuring continuous operation of critical security systems.


26. Which of the following is MOST effective for preventing unauthorized physical access to a server room?

A. Strong password B. CCTV cameras C. Biometric locks D. Antivirus software

Answer: C

Rationale: Biometric locks provide direct physical access control using unique human traits such as fingerprints or iris recognition. While CCTV monitors and passwords support security, only biometric systems effectively prevent unauthorized entry into server rooms.


27. Which wireless frequency band provides longer range but lower bandwidth in security networks?

A. 2.4 GHz B. 5 GHz C. 60 GHz D. 900 MHz

Answer: A

Rationale: The 2.4 GHz band penetrates walls and covers larger distances but offers lower speeds compared to the 5 GHz band. In security systems like CCTV, range often matters more than very high speed, making 2.4 GHz suitable in many cases.


28. The process of analyzing CCTV footage frame by frame to identify crime evidence is called:

A. Forensic video analysis B. Packet sniffing C. Load balancing D. Image hashing

Answer: A

Rationale: Forensic video analysis is the detailed examination of CCTV footage to extract, enhance, and validate crime-related evidence. This differs from packet sniffing (network), load balancing (network distribution), and image hashing (data integrity).


29. In intrusion detection systems, a “false positive” refers to:

A. An attack that is undetected B. A legitimate action flagged as an attack C. An attacker bypassing the firewall D. An ignored alarm

Answer: B

Rationale: A false positive occurs when legitimate activity is incorrectly flagged as malicious by an intrusion detection system. While it does not indicate real compromise, it creates noise and wastes time during investigations.


30. Which CCTV camera type can rotate horizontally and vertically for wider coverage?

A. Dome camera  B. Bullet camera C. Fixed box camera D. PTZ camera

Answer: D

Rationale: PTZ (Pan-Tilt-Zoom) cameras can rotate horizontally, tilt vertically, and zoom in/out, offering flexible surveillance coverage. Dome and bullet cameras are fixed and cannot provide dynamic monitoring.

📘 Get the Full Aptitude Test Questions PDF through your  Gmail (Questions 1–200)

You’ve just accessed the first 30 questions. The full set of 200 expertly prepared aptitude test questions for a ICT Officer II (Security) – Tanzania Ports Authority (TPA). Is available, pay, and get access.

To get access to the full PDF, please make a payment of Tsh 10,000 to the LIPA numbers below:

Airtel Money LIPA Number: 13970429
Yas/Tigo LIPA Number: 18401500
M-Pesa WAKALA:  826910
Selcom Lipa Number: 61122934
Registered Name: Johnson Yesaya Mgelwa

After payment, please send a text message to notify us of your payment:

Contact Number: +255 628 729 934

⚠️ Important Notice

  • The PDF will be watermarked with your name and phone number and protected for personal use only.
  • Redistribution, sharing, screenshotting, or copying the contents is strictly prohibited. When you share unlawfully, your name and phone number are visible and easy to trace as you leaked a document to other third parties.
  • Legal action may be taken against the misuse of this material.

Thank you for supporting quality content. Best of luck in your interview preparation!

Post a Comment

0 Comments