Ethics
|
|
Title of test:
![]() Ethics Description: A+ Yarab |



| New Comment |
|---|
NO RECORDS |
|
Computer crime (or cybercrime) is a crime that involves a computer only. True. False. There are several threats associated with network connectivity such as. authorised access. closure of sensitive information. Denial of service. A hacker may be accessing a computer resource with authorisation with the intention of committing an unlawful. True. False. The hacker’s activities may be limited to eavesdropping. True. False. There may be attacks that lead to. defacement of the web sites. theft of credit card numbers. bank fraud. all of them. Phishing is an attempt by the attacker to obtain sensitive personal information such as usernames and passwords. True. False. A computer virus is a self-replicating computer program. True. False. virus is malicious software in that when it is executed it replicates itself only. True. False. A virus often performs some type of harmful activity on the infected computers such as accessing private information. True. False. It is a crime per se to write a computer virus or malicious software. True. False. Phishing is a crime that involves an attack accompanied by a demand for money to stop the attack. True. False. Another form of computer crime is Internet fraud where one party is intent on deceiving another. True. False. The authorized access of a computer system is unlawful. True. False. A hacker is a person who uses his (or her) computer skills to gain unauthorised access to computer files or networks. True. False. A hacker may break into systems and cause damage or steal confidential information. True. False. Ethical hackers are not former hackers who play an important role in the security industry in testing network security. True. False. Malicious hackers are generally motivated by personal gain. True. False. The security of the system refers to its ability to protect itself from accidental or deliberate external attacks. True. False. Encrypted data is readable to the attacker. True. False. Software engineers are responsible for designing software only. True. False. A professional code of ethics expresses ideals of human behavior. True. False. There are … types of codes of ethics. Five. Six. Ten. none of them. A code of ethics places moral responsibility on ………to others and to society. a)computer professionals. b)software engineers. a and b. The concept of corporate social responsibility (CSR) means that companies have a responsibility to be good corporate citizens. True. False. An effective code of ethics does not help the corporation to achieve its corporate social responsibilities. True. False. Moral judgements and ethical decisions occur in various situations in a work environment. True. False. The hacker is a person who speaks out and informs the public on potentially unsafe. True. False. The whistle blower should only speak out in ….. situations. Five. Six. Ten. None of them. It is not important that the employee protects himself by gathering all evidence on the existence of danger. True. False. The IEEE code of ethics highlights the importance of speaking out in the case of danger. True. False. The IEEE Code of Ethics requires its members to promptly disclose any factors that might endanger the public or society. True. False. There are ….. main parts of the BCS code of conduct. Five. Six. Ten. None of them. The IEEE Code of Ethics requires its members to be conscious of the public health and environment. True. False. Which of the following is a cybercrime?. Hacking. Worm attack. Virus Attack. All of these. ……… Refer to email that appears to have been originated from one source when it was actually sent from another source. Email bombing. Email spoofing. Email spamming. None of these. Programs that multiply like viruses but spread from computer to computer are called as: Worms. Virus. Boot. None of these. Act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity is called ---. email bombing. Spamming. Cyber stalking. Phishing. ---is the attack in which some data will be injected into a web application. virus. Injection attacks. DNS Spoofing. Session Hijacking. ---is an attack which meant to make a server or network resource unavailable. Injection attacks. DNS Spoofing. Session Hijacking. Denial of Service. -- ensures that the data is authentic and accurate. Integrity. Availability. Confidentiality. CIA. --- makes the information to be available and useful for its authorized people. Integrity. Availability. Confidentiality. CIA. ---a software that secretly records information about user activities on their system. Spyware. Trojans. Virus. Worms. ---Occurs When someone tries to access a system, server, program, and service by using an illegal method. Unauthorized access. Typosquatting. Spamming. Wiretapping. ---requires Institute professionals to “act in the best interest of the client.” (Read the comment). Code Principle 1. Code Principle 3. Code Principle 4. none of them. --- requires Institute professionals to “provide clients information needed to make informed decisions.” (Read the comment). Code Principle 1. Code Principle 3. Code Principle 4. none of them. The term “promptly,” mean responses must be fairly and honestly presented in all material respects. True. False. “Truthfully” and “completely,” mean responses must be fairly and honestly presented in all material respects. True. False. --- requires Institute professionals to “maintain a high level of ethical conduct.” (Read the comment). Code Principle 1. Code Principle 3. Code Principle 4. None of them. Professional integrity is built by periodically evaluating core values and ethical principles. True. False. Code principle 1 requires institute professionals to “act in the best interests of the client.”. True. False. Principles 5 ,6 maybe applicable in diminished capacity situations like Principle number: 2. 7. 9. 1. Code principle 3 requires institute professional to “provide clients information needed to make informed decisions.” (Read the comment). True. False. The institute professional should be transparent and exercise independent judgement in the analysis. True. False. The institute professional should not rely upon other sources for information as part of the research process. True. False. Under principle 5 promptly responding to a client could mean any time period. True. False. “To maintain confidentiality,” means to keep the client information public and not disclosed to any unauthorized person. True. False. |






