An employee is at a restaurant with friends and tells them about an exciting new video game that is under development at the organization they work for. Is this employee’s behavior ethical or unethical?
CCST Test #3 for cert exam

Flashcard
•
Information Technology (IT)
•
9th Grade
•
Hard
Quizizz Content
FREE Resource
Student preview

12 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Back
Unethical
Answer explanation
In cybersecurity, "ethical" refers to practices that follow established moral principles, respecting user privacy, data integrity, and legal boundaries, while "unethical" describes actions that exploit vulnerabilities for personal gain, violate privacy, or intentionally cause harm, often involving unauthorized access and malicious intent; essentially, ethical cybersecurity professionals work to protect data and systems, while unethical actors aim to breach them for personal benefit.
2.
FLASHCARD QUESTION
Front
In networking, what name is given to the identifier at both ends of a transmission to ensure that the right data is passed to the correct application?
Back
Port number
Answer explanation
IP address: A unique numerical identifier assigned to a device on a network, allowing data to be routed to that specific device; essentially a "logical address" for a computer on the internet.
Port number: A specific number associated with a service or application running on a device, used to direct incoming data to the correct program on that device.
MAC address: A unique hardware identifier burned into a network interface card (NIC), used to identify a device on a local network at the physical level.
Sequence number: A number assigned to each packet of data in a sequence, used to ensure data is received in the correct order during transmission.
3.
FLASHCARD QUESTION
Front
‘An employee does something as an organization representative with the knowledge of that organization and this action is deemed illegal. The organization is legally responsible for this action.’ Is this statement true or false?
Back
True
Answer explanation
The legal principle of "respondeat superior," which means "let the master answer" - meaning the employer can be held liable for the actions of their employees, especially when those actions are performed within the scope of their employment and while representing the company.
Scope of employment: If an employee commits an illegal act while carrying out their assigned duties or acting on behalf of the company, the organization can be held responsible.
Apparent authority: Even if an employee is not explicitly authorized to perform a specific action, if they appear to be acting as a company representative to a third party, the company may still be liable.
4.
FLASHCARD QUESTION
Front
‘A data breach does not impact the reputation of an organization.’ Is this statement true or false?
Back
False
Answer explanation
A data breach significantly impacts an organization's reputation because it exposes sensitive customer information, leading to a loss of trust from customers, partners, and the public, resulting in negative media attention and a perception that the company cannot adequately protect sensitive data, potentially damaging their credibility and brand image.
5.
FLASHCARD QUESTION
Front
For what purpose would a network administrator use the Nmap tool?
Back
To detect and identify open ports.
Answer explanation
Nmap, which stands for "Network Mapper", is a free and open-source tool used to scan networks and discover active devices, identify open ports on those devices, detect the services running on those ports, and gather information about the operating systems running on them, essentially creating a detailed map of a network to assess its security posture and identify potential vulnerabilities; making it a valuable tool for network administrators and security professionals.
6.
FLASHCARD QUESTION
Front
What type of attack uses zombies?
Back
DDoS
Answer explanation
Explanation: A Distributed DoS (DDoS) attack is similar to a DoS attack but originates from multiple, coordinated sources. For example:
• An attacker builds a network (botnet) of infected hosts called zombies, which are controlled by handler systems.
• The zombie computers will constantly scan and infect more hosts, creating more and more zombies.
• When ready, the hacker will instruct the handler systems to make the botnet of zombies carry out a DDoS attack.
7.
FLASHCARD QUESTION
Front
What is the purpose of a backdoor?
Back
To gain unauthorized access to a system without normal authentication procedures
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Vocab Flashcard E103

Flashcard
•
9th - 10th Grade
10 questions
Political and Economic Regions

Flashcard
•
9th - 10th Grade
10 questions
Political and Economic Regions

Flashcard
•
9th - 10th Grade
15 questions
Jobs

Flashcard
•
9th Grade
9 questions
Understanding Paystub Components

Flashcard
•
8th Grade
9 questions
CODA

Flashcard
•
9th Grade
10 questions
BTEC DIT - Security

Flashcard
•
9th Grade
10 questions
Levels of Organization

Flashcard
•
9th - 10th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University