Ethical Issues and Privacy

Ethical Issues and Privacy

University

9 Qs

quiz-placeholder

Similar activities

Physical Security

Physical Security

1st Grade - University

10 Qs

Module 8-Network Layer

Module 8-Network Layer

9th Grade - University

12 Qs

Chapter 9 Audit Log

Chapter 9 Audit Log

University

10 Qs

Computer Netwrorking Introduction

Computer Netwrorking Introduction

University

7 Qs

Cybersecurity

Cybersecurity

University

12 Qs

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

Chapter 7: Network Security: Firewall, Antivirus, and Encryption

University

10 Qs

Workshop - Introduce Of a Wireshark

Workshop - Introduce Of a Wireshark

1st Grade - University

12 Qs

Risk Management

Risk Management

University

9 Qs

Ethical Issues and Privacy

Ethical Issues and Privacy

Assessment

Quiz

Computers

University

Hard

Created by

Rasika Ransing

Used 28+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of beliefs about right or wrong, is the meaning of .....

Law

Morals

Ethics

Legal

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Information Security

Physical Security

Network Security

Database Security

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

From the options below, which of them is not a threat to information security?

Disaster

Eavesdropping

Information leakage

Unchanged default password

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

From the options below, which of them is not a vulnerability to information security?

latest patches and updates not done

without deleting data, disposal of storage media

unchanged default password

flood

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Compromising confidential information comes under _________

Vulnerability

Threat

Attack

Bug

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 'malware'?

A virus or worm

A Trojan horse

A hacker tool

A corrupted program

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall is used in a system connected to a wide area network to __________________

prevent spread of fire in the network

prevent unauthorized access by hackers

to scan for viruses in files

to extinguish fire spreading via network cables

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Electronic profile of you and your habits is called as _______________

Data Aggregators

Profiling

Digital Dossier

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social engineering is unintentional human error on the part of an employee.

True

False