- It is an important aspect of ethical issues in information technology.
- IT facilitates the users having their own hardware, operating system and software tools to access the servers that are connected to each other and to the users by a network.
UIT 2221 ICT SFETY AND SECURITY (COPTPA)
Quiz
•
Computers
•
University
•
Hard
CHE (IKBN-KEMASIK)
Used 15+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- It is an important aspect of ethical issues in information technology.
- IT facilitates the users having their own hardware, operating system and software tools to access the servers that are connected to each other and to the users by a network.
Access Right
Personal Privacy
Harmful Actions
Patents
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- It is more difficult to deal with these types of ethical issues.
- A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining a copyright.
Trade Secrets
Copyright
Patents
Access Right
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
- One should be aware of the liability issue in making ethical decisions.
- Software developer makes promises and assertions to the user about the nature andqualityoftheproductthatcanberestrictedasanexpresswarranty.
Liability
Trade Secrets
Piracy
Copyright
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Hackers can use it to:
> Delete, modify and capture data
> Harvest your device as part of a botnet
> Spy on your device
> Gainaccesstoyournetwork
Ransomware
Trojans
Spyware
Worm
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
.................is malicious software that denies or restricts access to your own files. Then it demands payment (usually with crypto-currencies) in return for letting you back in.
Adware & Malvertising
Spyware
Worm
Ransomware
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
________________ help hackers with all manner of malicious activities, including:
· DDoS attacks
· Keylogging, screenshots and webcam access
· Spreading other types of malware
· Sending spam and phishing messages
Bots & Botnets
Ransomware
Backdoor
Spyware
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The figure is about.......
Malvertising is the use of adware to spread malware
Spyware hides on a device and secretly records your online activity, harvesting your data and collecting personal information
The structure of Botnet
Backdoor Bypassing Security To Gain Access To A Restricted Part Of A Computer System
10 questions
Information Security Principles
Quiz
•
University
10 questions
Software Security
Quiz
•
University - Professi...
10 questions
ITE-13-Quiz01
Quiz
•
University
14 questions
Cyber Threats
Quiz
•
9th Grade - University
13 questions
Chapter 9: Securing Your System: Protecting Your Digital Data a
Quiz
•
University
10 questions
Cybersecurity Fundamentals Week 3 Quiz
Quiz
•
KG - University
10 questions
Malware
Quiz
•
University
12 questions
Informática Básica
Quiz
•
University
15 questions
Multiplication Facts
Quiz
•
4th Grade
20 questions
Math Review - Grade 6
Quiz
•
6th Grade
20 questions
math review
Quiz
•
4th Grade
5 questions
capitalization in sentences
Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance
Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions
Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines
Quiz
•
Professional Development
12 questions
Dividing Fractions
Quiz
•
6th Grade