Search Header Logo
SIB Chapter 13-Security and Ethical Challenges

SIB Chapter 13-Security and Ethical Challenges

Assessment

Presentation

Business

University

Practice Problem

Hard

Created by

Ijal Zhulqurnain

Used 1+ times

FREE Resource

53 Slides • 33 Questions

1

media

2

Multiple Choice

What are the key security and ethical challenges in the context of automation and robotics in industries?

1

Data privacy concerns

2

Job displacement

3

Increased efficiency

4

Higher production costs

3

media

4

Multiple Choice

What are some of the societal challenges related to IT security?

1

Health issues

2

Privacy issues

3

Computer crime

4

All of the above

5

media

6

Multiple Choice

What are the expected outcomes from the Information Systems as depicted in the diagram?

1

Management Challenges

2

Business Applications

3

Information Technologies

4

Development Processes

7

media

8

Multiple Choice

What are the two main effects of IT on society and people?

1

Beneficial effects

2

Detrimental effects

3

Both beneficial and detrimental effects

4

Neither beneficial nor detrimental effects

9

media

10

Multiple Choice

What does equity in a business represent?

1

The amount of debt a company has

2

The total assets minus total liabilities

3

The amount of money that would be returned to shareholders if all the assets were liquidated and all the company's debt was paid off

4

Both B and C are correct

11

media

12

Multiple Choice

What are the categories of ethical business issues listed in the image?

1

Equity

2

Rights

3

Honesty

4

Exercise of Corporate Power

13

media

14

Multiple Choice

What are the three main theories of corporate social responsibility mentioned in the image?

1

Stockholder Theory

2

Social Contract Theory

3

Stakeholder Theory

4

Profit Maximization Theory

15

media

16

Multiple Select

What are the four principles of technology ethics mentioned in the image?

1

Proportionality

2

Informed Consent

3

Justice

4

Minimized Risk

17

media

18

Multiple Choice

What are the obligations I shall recognize towards my employer according to the AITP Standards of Professional Conduct?

1

Avoid conflicts of interest

2

Use knowledge for personal gain

3

Misrepresent information

4

Exploit weaknesses of systems

19

Multiple Choice

Which of the following best describes workplace privacy rights?

1

Employees have no right to privacy at work

2

Employees have the right to a reasonable expectation of privacy in certain areas

3

Employers can monitor all employee activities without restriction

4

Employees can refuse to share any information with their employer

20

Multiple Choice

What is an example of respecting workplace privacy rights?

1

Monitoring all employee communications without notice

2

Allowing employees to have private conversations in designated areas

3

Requiring employees to disclose all personal information

4

Sharing employee personal data with other employees

21

media

22

Multiple Choice

What are the key characteristics of a responsible professional?

1

Acts with integrity

2

Increases personal competence

3

Sets low standards of personal performance

4

Advances the health, privacy, and general welfare of the public

23

media

24

Multiple Choice

What are the different types of computer crimes mentioned in the slide?

1

Unauthorized use of software

2

Unauthorized release of information

3

Denying access to hardware

4

Using computer resources legally

25

media

26

Multiple Choice

Question image

Kai Cenat wants to stream but only has access to a public wi-fi network. Which of the following is true about public Wi-Fi networks?

1

They are always secure

2

They should be used to conduct financial transactions

3

They may be less secure, so sensitive activities should be avoided

4

They are safer than your home network

27

media

28

Multiple Choice

What is the definition of hacking according to the image?

1

The obsessive use of computers

2

The authorized access and use of networked computer systems

3

Hacking into a computer system and stealing files

4

A malicious hacker who helps others

29

media

30

Multiple Choice

What's the name given to the cyber-attack where the perpetrator seeks to make a machine unavailable to its intended users by temporarily disrupting its services, typically accomplished by flooding the targeted machine in an attempt to overload it?
1
Spam
2
Cyberbullying
3
Denial of Service (DoS)
4
Ransomware

31

media

32

Multiple Choice

What are the main characteristics of cyber theft as described in the text?

1

Involves the theft of physical goods

2

Majority are inside jobs

3

Most attacks occur through the Internet

4

Companies always reveal cybercrime incidents

33

media

34

Multiple Choice

What is the definition of cyber terrorism according to the National Conference of State Legislatures (NCSL)?

1

The use of information technology by terrorist groups

2

The leveraging of an organization’s computers

3

The execution of attacks against networks

4

The exchange of information electronically

35

media

36

Multiple Choice

What are some examples of unauthorized use of computer systems and networks at work?

1

Doing private consulting

2

Playing video games

3

Unauthorized use of the Internet

4

All of the above

37

media

38

Multiple Choice

What are some examples of internet abuses in the workplace?

1

General E-mail Abuses

2

Unauthorized Usage and Access

3

Copyright Infringement/Plagiarism

4

All of the above

39

media

40

Multiple Choice

What does purchasing software represent?

1

A payment for a license for fair use

2

A donation to the software company

3

A way to get free updates

4

A method to share software

41

media

42

Multiple Choice

What has made it easy to trade pirated intellectual property?

1

Social media

2

Peer-to-peer networking techniques

3

Streaming services

4

Online marketplaces

43

media

44

Multiple Choice

What is the difference between a worm and a virus?

1

A worm requires a host program, while a virus does not.

2

A virus requires a host program, while a worm does not.

3

Both require a host program to spread.

4

Neither can spread without user intervention.

45

media

46

Multiple Choice

What is the method of spreading for the Netsky virus?

1

Emailing itself to all addresses

2

Using Kazaa file-sharing

3

Renaming itself to common files

4

All of the above

47

Multiple Choice

What are the main characteristics of the My Doom virus?

1

Spread via email and Kazaa

2

Installs a back door

3

Opens TCP ports

4

All of the above

48

media

49

Multiple Choice

What is the main function of the Klez virus?

1

Mass-mailing email worm

2

Exploits vulnerabilities in MS Outlook

3

Deletes files on even-numbered months

4

All of the above

50

Multiple Choice

What are the characteristics of the SoBig virus?

1

Mass-mailing email worm

2

Scans .WAB, .WBX, .HTML, .EML, and .TXT files

3

Attempts to download updates

4

All of the above

51

media

52

Multiple Choice

What is the main method by which the Sasser virus spreads?

1

Through user intervention

2

By exploiting a Microsoft vulnerability

3

Via email attachments

4

Through file sharing

53

media

54

Multiple Choice

What was the total economic damage from virus proliferation in 2004?

1

$100 billion

2

$166 billion

3

$202 billion

4

$300 billion

55

media

56

Multiple Choice

What distinguishes spyware from adware?

1

Spyware captures user information

2

Spyware is always harmful

3

Adware is free software

4

Adware does not connect to the Internet

57

Multiple Choice

What is the main purpose of adware?

1

To serve a useful purpose

2

To capture user information

3

To display pop-up ads

4

To connect to the Internet

58

Multiple Choice

A program installed to collect information about users, their systems or browsing habits, keys that are typed, sending the data to a remote user.

1

IOT Attacks

2

Zero Day Exploit

3

Denial of Service

4

Spyware

59

media

60

media

61

media

62

media

63

media

64

media

65

media

66

media

67

media

68

media

69

media

70

media

71

media

72

media

73

media

74

media

75

media

76

media

77

media

78

media

79

media

80

media

81

media

82

media

83

media

84

media

85

media

86

Poll

How confident do you feel about this topic now?

Very confident
Somewhat confident
Not confident
media

Show answer

Auto Play

Slide 1 / 86

SLIDE