
UIT 2221 ICT SFETY AND SECURITY (COPTPA)
Authored by CHE (IKBN-KEMASIK)
Computers
University
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- It is an important aspect of ethical issues in information technology.
- IT facilitates the users having their own hardware, operating system and software tools to access the servers that are connected to each other and to the users by a network.
Access Right
Personal Privacy
Harmful Actions
Patents
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- It is more difficult to deal with these types of ethical issues.
- A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining a copyright.
Trade Secrets
Copyright
Patents
Access Right
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- One should be aware of the liability issue in making ethical decisions.
- Software developer makes promises and assertions to the user about the nature andqualityoftheproductthatcanberestrictedasanexpresswarranty.
Liability
Trade Secrets
Piracy
Copyright
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Hackers can use it to:
> Delete, modify and capture data
> Harvest your device as part of a botnet
> Spy on your device
> Gainaccesstoyournetwork
Ransomware
Trojans
Spyware
Worm
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
.................is malicious software that denies or restricts access to your own files. Then it demands payment (usually with crypto-currencies) in return for letting you back in.
Adware & Malvertising
Spyware
Worm
Ransomware
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
________________ help hackers with all manner of malicious activities, including:
· DDoS attacks
· Keylogging, screenshots and webcam access
· Spreading other types of malware
· Sending spam and phishing messages
Bots & Botnets
Ransomware
Backdoor
Spyware
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The figure is about.......
Malvertising is the use of adware to spread malware
Spyware hides on a device and secretly records your online activity, harvesting your data and collecting personal information
The structure of Botnet
Backdoor Bypassing Security To Gain Access To A Restricted Part Of A Computer System
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?