Ethics
![]() |
![]() |
![]() |
Title of test:![]() Ethics Description: Final Exam |




New Comment |
---|
NO RECORDS |
Which of the following involves impersonating a legitimate company to steal sensitive information?. Spamming. Phishing. Pharming. Denial of Service. Software that appears legitimate but performs malicious actions in the background is known as: Virus. Worm. Trojan Horse. Spyware. Sending unsolicited bulk emails is referred to as: Phishing. Spamming. Spoofing. Malware distribution. Which of the following is a cybercrime?. Hacking. Worm Attack. Virus attack. All of these. Programs that multiply like viruses but spread from computer to computer are called as: Worms. Virus. Boot. None of these. -----is the attack in which some data will be injected into a web application. virus. injection attacks. DNS Spoofing. Session Hijacking. -----is an attack which meant to make a server or network resource unavailable. Injection attacks. DNS Spoofing. Session Hijacking. Denial of Service. -----ensures that the data is authentic and accurate. Integrity. Availability. Confidentiality. CIA. makes the information to be available and useful for its authorized people. Integrity. Availability. confidentiality. CIA. ----a software that secretly records information about user activities on their system. Spyware. Trojans. Virus. Worms. There are … types of codes of ethics. Five. Six. Ten. None of them. The whistle blower should only speak out in ….. situations. Five. Six. Ten. None of them. There are ….. main parts of the BCS code of conduct. Five. Six. Ten. None of them. The hacker’s activities may be limited to eavesdropping. True. False. A computer virus is a self-replicating computer program. True. false. It is a crime per se to write a computer virus or malicious software. True. False. The authorized access of a computer system is unlawful. True. False. Malicious hackers are generally motivated by personal gain. True. False. Encrypted data is readable to the attacker. True. False. The IEEE Code of Ethics requires its members to be conscious of the public health and environment. True. False. A professional code of ethics expresses ideals of human behavior. True. False. The authorized access of a computer system is unlawful. True. False. A hacker is a person who uses his (or her) computer skills to gain unauthorized access to computer files or networks. True. False. Connecting a new smart device without checking any settings is not recommended. True. False. Malware attack does not solely involve overwhelming a system with excessive traffic. True. False. Statements about how people should behave fit together to form the ------ by which a society lives. moral code. user. law. None of the above. ----- is a set of beliefs about right and wrong behavior within a society. Certificate. Ethics. Law. None of the above. are one’s personal beliefs about right and wrong, while the term ethics describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs. Morals. Users. Laws. None of the above. ----- is a system of rules that tells us what we can and cannot do. Moral. User. Law. None of the above. A(n) ------ is a moral habit that inclines people to do what is considered acceptable. virtue. User. Law. None of the above. A professional is someone who. a. requires advanced training and experience. b. must exercise discretion and judgment in the course of his or her work. c. does work that cannot be standardized. d. all of the above. The mission of the Business Software Alliance is to _. stop the unauthorized copying of software produced by its members. stop the authorized copying of software produced by its members. Both. None of them. Reporting a trade secret is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest. True. False. ------ is the crime of obtaining goods, services, or property through deception or trickery. Fraud. Law. Ethics. All of the above. Résumé inflation is a usual and customary practice tolerated by employers. True. False. Society expects professionals to act in a way that: a. causes no harm to society. b. provides significant benefits. c. establishes and maintains professional standards that protect the public. d. all of the above. involves providing money, property, or favors to someone in business or government to obtain a business advantage. Bribery. Fraud. Law. All of the above. is a process that one undertakes voluntarily to prove competency in a set of skills. Licensing. Certification. Registering. All of the above. There are many industry associations and vendor certificate programs for IT workers. True. False. ------has been defined as not doing something that a reasonable person would do, or doing something that a reasonable person would not do. Negligence. Bribery. Fraud. None of the above. A ----- states the principles and core values that are essential to the work of a particular occupational group. Bribery. Fraud. Code of ethics. None of the above. The …..... is a trade group that represents the world’s largest software and hardware manufacturers. Bribery. Fraud. Business Software Alliance. None of the above. ------ deal with many different hardware, software, and service providers. Users. IT workers. Laws. None of the above. .... is the person who uses a hardware or software product from the IT workers who develop, install, service, and support the product. IT user. IT worker. Supplier. None of the above. A ------ states the principles and core values that are essential to the work of a particular occupational group. Business Software Alliance. professional organization. None of the above. professional code of ethics. Computer crime (or cybercrime) is a crime that involves a computer only. true. false. There are several threats associated with network connectivity such as. authorized access. Closure of sensitive information. Denial of service. A hacker may be accessing a computer resource with authorization with the intention of committing an unlawful. true. false. The hacker’s activities may be limited to eavesdropping. true. false. There may be attacks that lead to. a) defacement of the web sites. c) theft of credit card numbers. b) bank fraud. d) all of them. Phishing is an attempt by the attacker to obtain sensitive personal information such as usernames and passwords. true. false. A computer virus is a self-replicating computer program. true. false. virus is malicious software in that when it is executed it replicates itself only. true. false. A virus often performs some type of harmful activity on the infected computers such as accessing private information. true. false. It is a crime per se to write a computer virus or malicious software. true. false. Phishing is a crime that involves an attack accompanied by a demand for money to stop the attack. true. false. Another form of computer crime is Internet fraud where one party is intent on deceiving another. true. false. The authorized access of a computer system is unlawful. true. false. A hacker is a person who uses his (or her) computer skills to gain unauthorized access to computer files or networks. true. false. A hacker may break into systems and cause damage or steal confidential information. true. false. Ethical hackers are not former hackers who play an important role in the security industry in testing network security. true. false. Malicious hackers are generally motivated by personal gain. true. false. The security of the system refers to its ability to protect itself from accidental or deliberate external attacks. true. false. Encrypted data is readable to the attacker. true. false. Software engineers are responsible for designing software only. true. false. A professional code of ethics expresses ideals of human behavior. true. false. There are … types of codes of ethics. five. six. ten. none of them. A code of ethics places moral responsibility on ………to others and to society. computer professionals. software engineers. Both. The concept of corporate social responsibility (CSR) means that companies have a responsibility to be good corporate citizens. true. false. An effective code of ethics does not help the corporation to achieve its corporate social responsibilities. true. false. Moral judgements and ethical decisions occur in various situations in a work environment. true. false. The hacker is a person who speaks out and informs the public on potentially unsafe. true. false. The whistle blower should only speak out in ….. situations. Five. Six. Ten. None of them. It is not important that the employee protects himself by gathering all evidence on the existence of danger. true. false. The IEEE code of ethics highlights the importance of speaking out in the case of danger. true. false. The IEEE Code of Ethics requires its members to promptly disclose any factors that might endanger the public or society. true. false. There are ….. main parts of the BCS code of conduct. Five. Six. Ten. None of them. The IEEE Code of Ethics requires its members to be conscious of the public health and environment. true. false. |