Ethical Issues and Privacy

Ethical Issues and Privacy

University

9 Qs

quiz-placeholder

Similar activities

Chapter 9 Audit Log

Chapter 9 Audit Log

University

10 Qs

ITBP301_Chapter 01

ITBP301_Chapter 01

University

10 Qs

Switching and Routing

Switching and Routing

University

10 Qs

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

8th Grade - University

14 Qs

Network and Cyber Security Module 1 quiz

Network and Cyber Security Module 1 quiz

University

10 Qs

Hacking Scenarios

Hacking Scenarios

University

12 Qs

L8: Network security Defence in Depth

L8: Network security Defence in Depth

University

10 Qs

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

Ethical Issues and Privacy

Ethical Issues and Privacy

Assessment

Quiz

Computers

University

Hard

Created by

Rasika Ransing

Used 28+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of beliefs about right or wrong, is the meaning of .....

Law

Morals

Ethics

Legal

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Information Security

Physical Security

Network Security

Database Security

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

From the options below, which of them is not a threat to information security?

Disaster

Eavesdropping

Information leakage

Unchanged default password

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

From the options below, which of them is not a vulnerability to information security?

latest patches and updates not done

without deleting data, disposal of storage media

unchanged default password

flood

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Compromising confidential information comes under _________

Vulnerability

Threat

Attack

Bug

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 'malware'?

A virus or worm

A Trojan horse

A hacker tool

A corrupted program

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall is used in a system connected to a wide area network to __________________

prevent spread of fire in the network

prevent unauthorized access by hackers

to scan for viruses in files

to extinguish fire spreading via network cables

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Electronic profile of you and your habits is called as _______________

Data Aggregators

Profiling

Digital Dossier

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social engineering is unintentional human error on the part of an employee.

True

False