Ethical Issues and Privacy

Ethical Issues and Privacy

University

9 Qs

quiz-placeholder

Similar activities

Chapter 4 Revision

Chapter 4 Revision

University

10 Qs

Network Architecture

Network Architecture

University

14 Qs

Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

University

10 Qs

CHAPTER 4: IDS AND IPS

CHAPTER 4: IDS AND IPS

University

10 Qs

Mitigating Threats

Mitigating Threats

University

12 Qs

Network and its types

Network and its types

University

10 Qs

Week #7 - Risk Management

Week #7 - Risk Management

University

12 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

Ethical Issues and Privacy

Ethical Issues and Privacy

Assessment

Quiz

Computers

University

Hard

Created by

Rasika Ransing

Used 28+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of beliefs about right or wrong, is the meaning of .....

Law

Morals

Ethics

Legal

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Information Security

Physical Security

Network Security

Database Security

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

From the options below, which of them is not a threat to information security?

Disaster

Eavesdropping

Information leakage

Unchanged default password

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

From the options below, which of them is not a vulnerability to information security?

latest patches and updates not done

without deleting data, disposal of storage media

unchanged default password

flood

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Compromising confidential information comes under _________

Vulnerability

Threat

Attack

Bug

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 'malware'?

A virus or worm

A Trojan horse

A hacker tool

A corrupted program

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall is used in a system connected to a wide area network to __________________

prevent spread of fire in the network

prevent unauthorized access by hackers

to scan for viruses in files

to extinguish fire spreading via network cables

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Electronic profile of you and your habits is called as _______________

Data Aggregators

Profiling

Digital Dossier

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social engineering is unintentional human error on the part of an employee.

True

False