Cybersecurity Ethics

Cybersecurity Ethics

10th Grade - University

10 Qs

quiz-placeholder

Similar activities

CIA Triad & Digital Security

CIA Triad & Digital Security

11th Grade

13 Qs

Introduction to I.T. Essentials

Introduction to I.T. Essentials

9th - 12th Grade

12 Qs

Cybersecurity

Cybersecurity

12th Grade

10 Qs

KiCA Quizzes

KiCA Quizzes

KG - University

12 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

WJEC Computer Science KO - Security and Data Management

WJEC Computer Science KO - Security and Data Management

11th Grade

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

File Encryption Quiz

File Encryption Quiz

12th Grade

15 Qs

Cybersecurity Ethics

Cybersecurity Ethics

Assessment

Quiz

Computers

10th Grade - University

Hard

Created by

Reiner Dizon-Paradis

Used 164+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

How do you unlock a circuit that is protected using Hardware Obfuscation or Sequential Locking?

providing the ciphertext

using a sequence of key bits that loads one by one

loading all the key bits into the locking gates

testing out all combinations

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What is the simplest approach to Hardware Obfuscation?

adding encryption engine that implements AES

adding flip-flops (and states to the FSM)

inserting a hardware trojan

adding XOR/XNOR gates

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What are examples of harms to privacy?

placement of flip-flops

identity theft, blackmail, extortion

locking a computer system

misappropriate electronic funds

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What are examples of harms to property?

misappropriate electronic funds

steal valuable intellectual property

act of god

indemnification

adding countermeasures

extending encryption

protecting intellectual property

securing hardware systems

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

In terms of Transparency & Disclosure, what is the ethical duty of a cybersecurity professional?

withhold information from all those affected

consider the cost of cybersecurity within the organization

disclose risks, when known, to those affected

remotely cause damage or destruction

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What is one question to ask when considering Threat or Incident Response?

Have we prepared for the worst scenario?

What encryption do we use?

Have we struck a balance and all agree on it?

How do we securely store information?

7.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What is one question to ask when considering Network Monitoring?

What are the gray areas in our responses?

What do we do if agencies told us to weaken encryption?

What do we do if we’re told to violate our duty?

How do we monitor our network without intruding on our users?

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?