Which of the following best highlights three differences between good conduct and good ethics?

Ethics, Law, and Information Security Worksheet

Quiz
•
Computers
•
Professional Development
•
Medium
simar kaur
Used 6+ times
FREE Resource
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Conduct is about actions; ethics are about values. Conduct is seen by others; ethics are internal. Conduct can vary; ethics are more consistent.
Conduct is unethical; ethics are illegal. Conduct is internal; ethics are external. Ethics depend on popularity.
Conduct and ethics are the same in all cases.
Conduct is emotional; ethics are physical. Conduct affects law; ethics do not. Ethics are always visible.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can the USA PATRIOT Act affect businesses using U.S.-based hosting services?
It requires all foreign businesses to pay extra taxes to the U.S.
It allows U.S. authorities to access data stored by U.S. companies, even if the data belongs to foreign clients.
It bans non-U.S. companies from using American cloud services.
It ensures data hosted in the U.S. is protected from any government access.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not one of the 10 basic principles of the CSA Code for the protection of personal information?
A. Accountability
B. Consent
C. Unlimited Collection
D. Identifying Purposes
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Effective ways to add character diversity to a password include which of the following?
Using a mix of uppercase, lowercase, numbers, and symbols
Repeating the same character multiple times
Using only lowercase letters
Using only numbers
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following are good practices for creating a strong password?
Use a mix of uppercase and lowercase letters
Include numbers and special characters (e.g., @, #, !)
Repeat the same word multiple times
Replace some letters with symbols (e.g., “a” with “@”)
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following are acceptable forms of preventing hacking?
Double encryption
Prevent root access
Think like a thief
Trick your users to give info
Run server processes such as web or database as root
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The United States does not have any privacy legislation in place.
True
False
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
VR STEM World - Computer Science Fundamentals

Quiz
•
1st Grade - Professio...
20 questions
0309 MF3-UF1 Tema 3-2

Quiz
•
Professional Development
20 questions
Network Security Fundamentals

Quiz
•
Professional Development
18 questions
IT User Fundamentals

Quiz
•
Professional Development
15 questions
Level 5 - OSP Quiz

Quiz
•
Professional Development
13 questions
CyberSecurity

Quiz
•
Professional Development
20 questions
0309 MF3-UF1 Tema 3

Quiz
•
Professional Development
15 questions
Seguridad informática 4ESO

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade