Search Header Logo

Ethics, Law, and Information Security Worksheet

Authored by simar kaur

Computers

Professional Development

Used 6+ times

Ethics, Law, and Information Security Worksheet
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best highlights three differences between good conduct and good ethics?

Conduct is about actions; ethics are about values. Conduct is seen by others; ethics are internal. Conduct can vary; ethics are more consistent.

Conduct is unethical; ethics are illegal. Conduct is internal; ethics are external. Ethics depend on popularity.

Conduct and ethics are the same in all cases.

Conduct is emotional; ethics are physical. Conduct affects law; ethics do not. Ethics are always visible.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can the USA PATRIOT Act affect businesses using U.S.-based hosting services?

It requires all foreign businesses to pay extra taxes to the U.S.

It allows U.S. authorities to access data stored by U.S. companies, even if the data belongs to foreign clients.

It bans non-U.S. companies from using American cloud services.

It ensures data hosted in the U.S. is protected from any government access.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the 10 basic principles of the CSA Code for the protection of personal information?

A. Accountability

B. Consent

C. Unlimited Collection

D. Identifying Purposes

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Effective ways to add character diversity to a password include which of the following?

Using a mix of uppercase, lowercase, numbers, and symbols

Repeating the same character multiple times

Using only lowercase letters

Using only numbers

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are good practices for creating a strong password?

Use a mix of uppercase and lowercase letters

Include numbers and special characters (e.g., @, #, !)

Repeat the same word multiple times

Replace some letters with symbols (e.g., “a” with “@”)

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are acceptable forms of preventing hacking?

Double encryption

Prevent root access

Think like a thief

Trick your users to give info

Run server processes such as web or database as root

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The United States does not have any privacy legislation in place.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?