Search Header Logo

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

Authored by CHE (IKBN-KEMASIK)

Computers

University

Used 15+ times

UIT 2221 ICT SFETY AND SECURITY (COPTPA)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

- It is an important aspect of ethical issues in information technology.

- IT facilitates the users having their own hardware, operating system and software tools to access the servers that are connected to each other and to the users by a network.

Access Right

Personal Privacy

Harmful Actions

Patents

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

- It is more difficult to deal with these types of ethical issues.

- A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining a copyright.

Trade Secrets

Copyright

Patents

Access Right

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

- One should be aware of the liability issue in making ethical decisions.

- Software developer makes promises and assertions to the user about the nature andqualityoftheproductthatcanberestrictedasanexpresswarranty.

Liability

Trade Secrets

Piracy

Copyright

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Hackers can use it to:

> Delete, modify and capture data

> Harvest your device as part of a botnet

> Spy on your device

> Gainaccesstoyournetwork

Ransomware

Trojans

Spyware

Worm

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

.................is malicious software that denies or restricts access to your own files. Then it demands payment (usually with crypto-currencies) in return for letting you back in.

Adware & Malvertising

Spyware

Worm

Ransomware

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

________________ help hackers with all manner of malicious activities, including:

·       DDoS attacks

·       Keylogging, screenshots and webcam access

·       Spreading other types of malware

·       Sending spam and phishing messages

Bots & Botnets

Ransomware

Backdoor

Spyware

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

The figure is about.......

Malvertising is the use of adware to spread malware

 

Spyware hides on a device and secretly records your online activity, harvesting your data and collecting personal information

The structure of Botnet

Backdoor Bypassing Security To Gain Access To A Restricted Part Of A Computer System

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?